{"id":349093,"date":"2025-10-02T00:50:00","date_gmt":"2025-10-02T07:50:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=397621"},"modified":"2025-10-02T02:03:34","modified_gmt":"2025-10-02T09:03:34","slug":"gemini-could-have-critical-vulnerabilities-that-make-its-use-dangerous","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/gemini-could-have-critical-vulnerabilities-that-make-its-use-dangerous\/","title":{"rendered":"Gemini could have critical vulnerabilities that make its use dangerous"},"content":{"rendered":"\n<p>Researchers from Tenable, a renowned cybersecurity company, have discovered <a href=\"https:\/\/www.ghacks.net\/2025\/09\/23\/google-announces-gemini-for-google-tv\/\">three vulnerabilities in Gemini, the artificial intelligence tool<\/a> developed by Google. <strong>This finding raises concerns among security experts, as Gemini is used in various applications that could be affected by these flaws<\/strong>. The revelation underscores the importance of security in the field of artificial intelligence, a sector that continues to grow and evolve rapidly.<\/p>\n\n\n<h2 class=\"wp-block-heading\">If you use Gemini, you could be putting your system at risk<\/h2>\n\n\n<p>The vulnerabilities identified in Gemini could allow an attacker to compromise the integrity of the system, <strong>gaining access to sensitive information or even taking control of applications dependent on this technology<\/strong>. Although the specific details about the vulnerabilities have not yet been fully disclosed, Tenable has indicated that they have taken steps to notify Google, which is currently assessing the related risks and working on possible solutions.<\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Google \u2013 Welcome to the Gemini era\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/_fuimO6ErKI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<p>Gemini, as an artificial intelligence tool, is used in a wide range of applications, from chatbots to business automation processes. <strong>The versatility of this tool makes it an attractive target for malicious agents<\/strong>. With the growth of artificial intelligence, companies face increasingly greater challenges regarding the security of their systems.<\/p>\n\n\n<p>Google is no stranger to security issues, having previously dealt with similar situations in other products.<strong> Timely responses to these vulnerabilities are crucial to maintaining user trust and safeguarding the technology that companies are increasingly beginning to rely on<\/strong>. Industry observers suggest that such incidents should serve as a wake-up call about the need to strengthen security measures in artificial intelligence tools.<\/p>\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Gemini\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/dcc4d6af-b3e7-48ec-96e2-c65903f60bca\/907894193\/gemini-google-logo\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Gemini<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/gemini-google.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/gemini-google.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Researchers from Tenable, a renowned cybersecurity company, have discovered three vulnerabilities in Gemini, the artificial intelligence tool developed by Google. This finding raises concerns among security experts, as Gemini is used in various applications that could be affected by these flaws. The revelation underscores the importance of security in the field of artificial intelligence, a sector that continues to grow and evolve rapidly. If you use Gemini, you could be putting your system at risk. The vulnerabilities identified in Gemini could allow an attacker to compromise the integrity of the system, accessing sensitive information or even taking control of [&#8230;]<\/p>\n","protected":false},"author":9318,"featured_media":349094,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015,11143],"tags":[13902,5605,6264,1068,3854,3885,3808,16760],"usertag":[],"vertical":[],"content-category":[6771,7176],"class_list":["post-349093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-softwaresecurity","tag-chatbots","tag-ciberseguridad","tag-gemini","tag-google","tag-ia","tag-inteligencia-artificial","tag-seguridad","tag-tenable","content-category-ai","content-category-seguridad-privacidad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/349093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9318"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=349093"}],"version-history":[{"count":2,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/349093\/revisions"}],"predecessor-version":[{"id":349106,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/349093\/revisions\/349106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/349094"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=349093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=349093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=349093"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=349093"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=349093"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=349093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}