Skip to main content

CVE-2025-1122: Out-of-bounds Write in Google ChromeOS

Medium
VulnerabilityCVE-2025-1122cvecve-2025-1122
Published: Tue Apr 15 2025 (04/15/2025, 19:51:23 UTC)
Source: CVE
Vendor/Project: Google
Product: ChromeOS

Description

Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 15753.50.0 stable on Cr50 Boards allows an attacker with root access to gain persistence and Bypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process.

AI-Powered Analysis

AILast updated: 07/05/2025, 04:12:47 UTC

Technical Analysis

CVE-2025-1122 is a medium-severity vulnerability identified in Google ChromeOS version 15753.50.0, specifically affecting Cr50 boards. The flaw is an out-of-bounds write (CWE-787) in the TPM2 Reference Library, which is part of the Trusted Platform Module (TPM) functionality used for hardware-based security. This vulnerability can be exploited by an attacker who already has root privileges on the device. By leveraging the out-of-bounds write during the NV_Read operation in the TPM's Challenge-Response process, the attacker can bypass the operating system verification mechanism. This bypass allows the attacker to gain persistence on the device, potentially maintaining control even after reboots or attempts to restore system integrity. The CVSS v3.1 score is 6.7 (medium), with attack vector local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although exploitation requires root access, the vulnerability is significant because it undermines the TPM's role in securing the boot process and system integrity, which are critical for trusted computing environments. No known exploits are currently reported in the wild, and no patches are linked yet, indicating the need for prompt attention from affected users and administrators.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to environments using ChromeOS devices with Cr50 boards, such as in education, government, and enterprise sectors where Chromebooks are deployed. The ability to bypass OS verification and gain persistence could allow attackers with initial root access to maintain long-term control, potentially leading to data exfiltration, espionage, or sabotage. Given the TPM's role in securing cryptographic keys and system integrity, exploitation could compromise sensitive information and undermine trust in device security. This is particularly critical for organizations relying on ChromeOS for secure endpoint management and those subject to strict data protection regulations like GDPR. The medium severity reflects the prerequisite of root access, but the high impact on confidentiality, integrity, and availability means that successful exploitation could have serious consequences, including disruption of operations and loss of sensitive data.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately verify if their ChromeOS devices run the affected version (15753.50.0) on Cr50 boards and prioritize updating to patched versions once available from Google. 2) Restrict root access strictly, employing least privilege principles and strong access controls to prevent attackers from gaining the required privileges to exploit this flaw. 3) Monitor device integrity and TPM logs for unusual NV_Read operations or anomalies in the Challenge-Response process that could indicate exploitation attempts. 4) Employ endpoint detection and response (EDR) solutions tailored for ChromeOS to detect persistence mechanisms and suspicious activities. 5) Educate IT staff and users about the importance of timely updates and the risks of privilege escalation. 6) Consider additional hardware security measures or alternative device configurations if ChromeOS devices are critical to sensitive operations until patches are deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ChromeOS
Date Reserved
2025-02-07T18:38:22.520Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd8045

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 4:12:47 AM

Last updated: 8/14/2025, 9:59:14 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats