Impact
The vulnerability arose because Gemini Enterprise used predictable Google Cloud Storage bucket names for error logs and temporary staging of data imports from GCS and Cloud SQL. An attacker could create these buckets before a victim’s first use, a technique known as bucket squatting, and thereby read sensitive information that was written to the buckets. The flaw results in the disclosure of confidential data through a storage service rather than breaking application or network security directly.
Affected Systems
Google Cloud Gemini Enterprise (formerly Agentspace) is affected. All versions released before December 12, 2025 are vulnerable. Versions released on or after that date have the fix in place.
Risk and Exploitability
The CVSS score of 9.1 places the vulnerability in the High severity range, indicating a significant impact on confidentiality. The EPSS score is less than 1 %, showing a low but non‑zero probability of exploitation at the time of analysis, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is inferred to be remote, as an attacker does not need privileged access to the victim’s environment to create the squatted buckets or subsequently read them.
OpenCVE Enrichment