Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1727: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Google Cloud Gemini Enterprise (formerly Agentspace)

0
Critical
VulnerabilityCVE-2026-1727cvecve-2026-1727cwe-200
Published: Fri Feb 06 2026 (02/06/2026, 21:44:42 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Gemini Enterprise (formerly Agentspace)

Description

CVE-2026-1727 is a critical vulnerability in Google Cloud Gemini Enterprise (formerly Agentspace) that exposes sensitive information due to predictable Google Cloud Storage bucket names. Attackers could perform bucket squatting by preemptively creating these buckets used for error logs and temporary staging during data imports, gaining unauthorized access to sensitive data. The vulnerability affects all versions prior to December 12, 2025, and has a CVSS score of 9. 1, indicating a critical severity. Exploitation requires no privileges or user interaction and can lead to high confidentiality and integrity impacts. Google has patched the vulnerability in versions released after December 12, 2025, with no user action required. European organizations using Gemini Enterprise should verify their version and ensure updates are applied promptly. Countries with significant cloud adoption and Google Cloud usage, such as Germany, the UK, France, and the Netherlands, are most at risk. Mitigation involves verifying bucket ownership, monitoring for unauthorized buckets, and applying the vendor patch. This vulnerability highlights the risks of predictable cloud resource naming and the importance of secure resource provisioning practices.

AI-Powered Analysis

AILast updated: 02/06/2026, 22:14:43 UTC

Technical Analysis

CVE-2026-1727 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Google Cloud Gemini Enterprise (formerly Agentspace). The root cause lies in the use of predictable Google Cloud Storage (GCS) bucket names for error logs and temporary staging during data imports from GCS and Cloud SQL. Because these bucket names were predictable, an attacker could engage in bucket squatting by creating these buckets before the legitimate user or service did, thereby gaining unauthorized access to sensitive information stored or processed within these buckets. This exposure could include error logs or staging data that may contain confidential or sensitive information. The vulnerability affects all versions prior to December 12, 2025, after which Google updated the service to prevent this issue. The CVSS 4.0 score of 9.1 reflects a critical severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality and integrity (VC:H, VI:H). The scope is limited (SC:L), and the vulnerability is publicly disclosed but no known exploits are currently in the wild. The vulnerability emphasizes the risks associated with predictable cloud resource identifiers and the importance of securing cloud storage configurations to prevent unauthorized access. Google’s patch eliminates the predictability, thus preventing bucket squatting attacks.

Potential Impact

For European organizations using Google Cloud Gemini Enterprise, this vulnerability poses a significant risk of unauthorized exposure of sensitive information, including potentially confidential logs and staging data. The critical severity and ease of exploitation mean attackers can remotely and without authentication gain access to sensitive data, potentially leading to data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. Organizations relying on this service for data imports and processing are particularly vulnerable. The exposure of sensitive information could facilitate further attacks, including social engineering or targeted intrusions. Given the widespread adoption of Google Cloud services in Europe, especially in countries with strong cloud infrastructure and digital economies, the impact could be substantial. However, since patches are available and no known exploits are in the wild, timely patching can effectively mitigate the risk. Failure to update could result in significant confidentiality and integrity losses, with potential legal and financial consequences under European data protection laws.

Mitigation Recommendations

European organizations should immediately verify the version of Google Cloud Gemini Enterprise in use and ensure it is updated to a version released after December 12, 2025, which includes the patch for this vulnerability. They should audit their Google Cloud Storage buckets to detect any unauthorized or suspicious buckets that may have been created through bucket squatting. Implement strict naming conventions and access controls for cloud storage resources to prevent predictability and unauthorized creation. Employ monitoring and alerting on bucket creation and access patterns to detect anomalous activities promptly. Additionally, organizations should review their cloud resource provisioning processes to eliminate predictable naming schemes and enforce least privilege access policies. Regularly review cloud service provider security advisories and integrate patch management into operational workflows. Finally, conduct security awareness training for cloud administrators on the risks of resource misconfiguration and bucket squatting.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2026-01-31T01:40:19.018Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69866468f9fa50a62f36cd1b

Added to database: 2/6/2026, 10:00:08 PM

Last enriched: 2/6/2026, 10:14:43 PM

Last updated: 2/6/2026, 11:08:20 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats