Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12435: Incorrect security UI in Google Chrome

0
Medium
VulnerabilityCVE-2025-12435cvecve-2025-12435
Published: Mon Nov 10 2025 (11/10/2025, 20:00:17 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Incorrect security UI in Omnibox in Google Chrome on Android prior to 142.0.7444.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 11/10/2025, 20:38:26 UTC

Technical Analysis

CVE-2025-12435 is a vulnerability identified in Google Chrome for Android devices, specifically affecting versions prior to 142.0.7444.59. The vulnerability stems from an incorrect security user interface (UI) implementation in the Omnibox, the browser's address bar. This flaw allows a remote attacker to craft a malicious HTML page that can spoof the UI elements displayed in the Omnibox, misleading users into believing they are visiting a legitimate or trusted website when they are not. The attack vector involves the victim navigating to a specially crafted webpage, which then manipulates the Omnibox display to present deceptive information such as fake URLs or security indicators. This UI spoofing can facilitate phishing attacks, tricking users into divulging sensitive information or credentials. The vulnerability does not require prior authentication but does require user interaction in the form of visiting the malicious page. Although no known exploits have been reported in the wild, the potential for social engineering attacks leveraging this flaw is significant. The Chromium security team has classified this vulnerability as medium severity, but no CVSS score has been assigned. The issue is specific to the Android platform version of Chrome, which is widely used across mobile devices globally. The lack of patch links in the provided data suggests that users should update to version 142.0.7444.59 or later once available to remediate the vulnerability.

Potential Impact

For European organizations, this vulnerability poses a risk primarily through social engineering and phishing attacks targeting mobile users. Given the widespread adoption of Android devices and Google Chrome as a default browser in Europe, especially among employees accessing corporate resources remotely, the UI spoofing flaw could be exploited to harvest credentials, deliver malware, or gain unauthorized access to sensitive systems. Financial institutions, government agencies, and enterprises with mobile-dependent workforces are particularly vulnerable to the reputational and operational impacts of successful phishing campaigns enabled by this vulnerability. The potential compromise of user credentials or session tokens could lead to broader network intrusions or data breaches. Additionally, the trust erosion in mobile browsing security could affect user behavior and corporate security postures. Although the vulnerability does not directly compromise system integrity or availability, the indirect effects through successful phishing attacks could be severe. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits following public disclosure.

Mitigation Recommendations

European organizations should prioritize updating Google Chrome on all Android devices to version 142.0.7444.59 or later as soon as the patch is available. Mobile device management (MDM) solutions should enforce this update policy to ensure compliance across the enterprise. Security awareness training should emphasize the risks of UI spoofing and phishing, instructing users to verify URLs carefully and avoid interacting with suspicious links. Implementing multi-factor authentication (MFA) can reduce the impact of credential theft resulting from phishing. Network-level protections such as DNS filtering and web proxy solutions can help block access to known malicious sites. Organizations should monitor for phishing campaigns exploiting this vulnerability and employ endpoint detection and response (EDR) tools to identify suspicious activity on mobile devices. Where possible, restricting the use of third-party or untrusted applications that can open web content may reduce exposure. Finally, coordinating with cybersecurity information sharing groups in Europe can provide timely intelligence on emerging exploits related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-10-28T20:16:48.759Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6912465c941466772c506ad8

Added to database: 11/10/2025, 8:09:00 PM

Last enriched: 11/10/2025, 8:38:26 PM

Last updated: 11/22/2025, 3:17:19 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats