Archive ready

ChatGPTでDNSを介したデータ流出の脆弱性、Check Pointが指摘:セキュリティニュースアラート - ITmedia エンタープライズ

https://www.itmedia.co.jp/enterprise/articles/2604/01/news076.html
April 2, 2026 at 01:37 PM JSTThe archive page, viewer, and downloads use this saved version.
April 2, 2026 at 01:37 PM JST·www.itmedia.co.jp

The evidence pack includes HTML, screenshots, summaries, and metadata. It can be downloaded on Pro.

Saved page

ChatGPTでDNSを介したデータ流出の脆弱性、Check Pointが指摘:セキュリティニュースアラート - ITmedia エンタープライズ

Open the archived HTML with saved-time metadata attached.

StartedApril 2, 2026 at 01:37 PM JST

This HTML has CSS and images embedded, so it can still be opened even if the original page disappears.

About this pageAI generated

This page reports on a vulnerability in ChatGPT's code execution environment discovered by Check Point. Data such as conversation contents and generated results could be transmitted to external servers through a side channel exploiting DNS name resolution mechanisms. A single malicious prompt could trigger information leakage. The vulnerability was already patched by OpenAI as of February 20, 2026. The issue is notable for functioning even in restricted environments.

ChatGPTでDNSを介したデータ流出の脆弱性、Check Pointが指摘:セキュリティニュースアラート - ITmedia エンタープライズ - Saved screenshot

The full page can be captured up to 15,000px in height so you can review the complete page layout when needed.