Add the feed URL directly to your feed reader: https://cloud.google.com/feeds/generative-ai-on-vertex-ai-security-bulletins.xml
GCP-2025-059
Published: 2025-10-21
Updated: 2025-10-22
Description
Severity
Notes
2025-10-22 Update: Added link to CVE.
On September 23, 2025, we discovered a technical issue in
the Vertex AI API that resulted in a limited amount of responses
being misrouted between recipients for certain third-party models
when using streaming requests. This issue is now resolved.
Google models, e.g. Gemini, were not impacted.
Some internal proxies did not properly handle HTTP requests that
have an Expect: 100-continue header, resulting in
a desynchronization in a streaming response connection, where
a response intended for one request was instead delivered as
the response for a subsequent request.
What should I do?
We have implemented fixes to properly address the presence of
the Expect: 100-continue header, and prevent recurrence
of this issue. We have also added testing, monitoring, and alerting
so that we can quickly detect an occurrence of this issue to prevent
regression. There is no action for customers to take at this time to
prevent the unintended behavior from occurring.
The fixes were rolled out for different models on separate schedules,
with Anthropic models being remediated by Sep. 26, 12:45 AM PDT and
all surfaces remediated by Sep. 28, 07:10 PM PDT. Affected models
on Vertex AI API and the time of resolution are listed below:
The issue has been fixed as of September 28, 2025, at
11:00 AM PDT.
Self-deployed
models for which the 'StreamRawPredict', 'ChatCompletions',
'GenerateContent', or 'StreamGenerateContent' method was invoked
using public
endpoints
The issue has been fixed as of September 28, 2025, at
7:10 PM PDT.
Neither
dedicated
(the default on Model Garden) nor private endpoints were
impacted.
A vulnerability was discovered in the Vertex AI API serving Gemini
multimodal requests, allowing bypass of
VPC Service Controls.
An attacker may be able to abuse the
fileURI
parameter of the API to exfiltrate data.
What should I do?
No actions needed. We've implemented a fix to return an error message when a
media file URL is specified in the fileUri parameter and VPC Service Controls
is enabled. Other use cases are unaffected.
What vulnerabilities are being addressed?
The Vertex AI API serving Gemini multimodal requests lets you
include media files by specifying the URL of the media file in the
fileUri parameter. This capability can be used to bypass
VPC Service Controls perimeters. An attacker inside the service perimeter
could encode sensitive data in the fileURI parameter to bypass
the service perimeter.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-22 UTC."],[],[]]