All versions after December 12th, 2025 have been updated to protect from this vulnerability. No user action is required for this.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 09 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google gemini |
|
| Vendors & Products |
Google
Google gemini |
Fri, 06 Feb 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Agentspace service was affected by a vulnerability that exposed sensitive information due to the use of predictable Google Cloud Storage bucket names. These names were utilized for error logs and temporary staging during data imports from GCS and Cloud SQL. This predictability allowed an attacker to engage in "bucket squatting" by establishing these buckets before a victim's initial use. All versions after December 12th, 2025 have been updated to protect from this vulnerability. No user action is required for this. | |
| Title | Information Disclosure via Bucket Squatting in Google Cloud Agentspace. | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GoogleCloud
Published:
Updated: 2026-02-09T15:04:49.064Z
Reserved: 2026-01-31T01:40:19.018Z
Link: CVE-2026-1727
Updated: 2026-02-09T15:04:40.808Z
Status : Awaiting Analysis
Published: 2026-02-06T22:16:10.860
Modified: 2026-02-09T16:08:55.263
Link: CVE-2026-1727
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:49:55Z