Description
The Agentspace service was affected by a vulnerability that exposed sensitive information due to the use of predictable Google Cloud Storage bucket names. These names were utilized for error logs and temporary staging during data imports from GCS and Cloud SQL. This predictability allowed an attacker to engage in "bucket squatting" by establishing these buckets before a victim's initial use.

All versions after December 12th, 2025 have been updated to protect from this vulnerability. No user action is required for this.
Published: 2026-02-06
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: No Action
AI Analysis

Impact

The vulnerability arose because Gemini Enterprise used predictable Google Cloud Storage bucket names for error logs and temporary staging of data imports from GCS and Cloud SQL. An attacker could create these buckets before a victim’s first use, a technique known as bucket squatting, and thereby read sensitive information that was written to the buckets. The flaw results in the disclosure of confidential data through a storage service rather than breaking application or network security directly.

Affected Systems

Google Cloud Gemini Enterprise (formerly Agentspace) is affected. All versions released before December 12, 2025 are vulnerable. Versions released on or after that date have the fix in place.

Risk and Exploitability

The CVSS score of 9.1 places the vulnerability in the High severity range, indicating a significant impact on confidentiality. The EPSS score is less than 1 %, showing a low but non‑zero probability of exploitation at the time of analysis, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is inferred to be remote, as an attacker does not need privileged access to the victim’s environment to create the squatted buckets or subsequently read them.

Generated by OpenCVE AI on April 17, 2026 at 22:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that your Gemini Enterprise deployment has a release date of December 12, 2025 or later.
  • If an older version is in use, apply the official update immediately.
  • Configure bucket naming policies to use random or non‑predictable identifiers and audit existing buckets for unauthorized access.
  • Monitor for anomalous bucket creation activity and restrict GCS write permissions to trusted users where feasible.

Generated by OpenCVE AI on April 17, 2026 at 22:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google gemini
Vendors & Products Google
Google gemini

Fri, 06 Feb 2026 22:00:00 +0000

Type Values Removed Values Added
Description The Agentspace service was affected by a vulnerability that exposed sensitive information due to the use of predictable Google Cloud Storage bucket names. These names were utilized for error logs and temporary staging during data imports from GCS and Cloud SQL. This predictability allowed an attacker to engage in "bucket squatting" by establishing these buckets before a victim's initial use. All versions after December 12th, 2025 have been updated to protect from this vulnerability. No user action is required for this.
Title Information Disclosure via Bucket Squatting in Google Cloud Agentspace.
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 9.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:L/U:Clear'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published:

Updated: 2026-02-09T15:04:49.064Z

Reserved: 2026-01-31T01:40:19.018Z

Link: CVE-2026-1727

cve-icon Vulnrichment

Updated: 2026-02-09T15:04:40.808Z

cve-icon NVD

Status : Deferred

Published: 2026-02-06T22:16:10.860

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1727

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:30:29Z

Weaknesses