Home

Description

A vulnerability in Google Cloud Vertex AI Workbench from 7/21/2025 to 01/30/2026 allows an attacker to exfiltrate valid Google Cloud access tokens of other users via abuse of a built-in startup script. All instances after January 30th, 2026 have been patched to protect from this vulnerability. No user action is required for this.

PUBLISHED Reserved 2026-02-09 | Published 2026-02-26 | Updated 2026-02-26 | Assigner GoogleCloud




HIGH: 8.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/U:Clear

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

7/21/2025 (date) before 01/30/2026
affected

Credits

Moshe Bernstein with Tenable reporter

References

docs.cloud.google.com/vertex-ai/docs/workbench/release-notes

cve.org (CVE-2026-2244)

nvd.nist.gov (CVE-2026-2244)

Download JSON