CVE-2025-12910: Inappropriate implementation in Google Chrome
Inappropriate implementation in Passkeys in Google Chrome prior to 140.0.7339.80 allowed a local attacker to obtain potentially sensitive information via debug logs. (Chromium security severity: Low)
AI Analysis
Technical Summary
CVE-2025-12910 is a vulnerability identified in Google Chrome's Passkeys implementation prior to version 140.0.7339.80. The issue stems from an inappropriate implementation that causes sensitive information to be exposed via debug logs accessible to local attackers. Passkeys are a modern authentication mechanism designed to replace passwords with cryptographic credentials, enhancing security. However, in this case, debug logs inadvertently contain sensitive data related to Passkeys, which could include authentication tokens or cryptographic material. The vulnerability is classified under CWE-1295, indicating improper implementation leading to information exposure. The CVSS v3.1 base score is 6.2 (medium severity), with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access but no privileges or user interaction, and impacts confidentiality significantly without affecting integrity or availability. No public exploits have been reported, suggesting limited active exploitation. The flaw primarily threatens confidentiality by allowing local attackers to glean sensitive authentication information, potentially facilitating further attacks or unauthorized access if combined with other vulnerabilities or social engineering. The vulnerability was published on November 7, 2025, and no patch links were provided in the source, but upgrading to Chrome 140.0.7339.80 or later is implied as the fix. This vulnerability highlights the importance of secure logging practices, especially for sensitive authentication components like Passkeys.
Potential Impact
For European organizations, the primary impact of CVE-2025-12910 is the potential leakage of sensitive authentication information through debug logs accessible to local attackers. This could lead to unauthorized access if attackers leverage the exposed data to impersonate users or bypass authentication mechanisms. Organizations with shared or poorly secured workstations, or environments where local access controls are lax, are at higher risk. The vulnerability does not directly affect system integrity or availability, but the confidentiality breach could facilitate subsequent attacks, including lateral movement or privilege escalation. Sectors with high security requirements, such as finance, government, and critical infrastructure, may face increased risk due to the sensitivity of the data potentially exposed. Additionally, organizations relying heavily on Chrome for authentication workflows using Passkeys must prioritize remediation to prevent exploitation. Since exploitation requires local access, remote attackers are less likely to benefit directly, but insider threats or malware with local execution capabilities remain concerns. The absence of known exploits reduces immediate risk but does not eliminate the need for prompt mitigation.
Mitigation Recommendations
1. Upgrade all Google Chrome installations to version 140.0.7339.80 or later as soon as possible to ensure the vulnerability is patched. 2. Restrict local access to systems running vulnerable Chrome versions by enforcing strict physical security and user access controls. 3. Limit access to debug logs by configuring logging settings to avoid storing sensitive Passkey information or by securing log files with appropriate permissions. 4. Implement endpoint detection and response (EDR) solutions to monitor for suspicious local activity that could indicate attempts to access debug logs or exploit the vulnerability. 5. Educate users and administrators about the risks of local access vulnerabilities and the importance of maintaining updated software. 6. Review and harden authentication workflows involving Passkeys to detect anomalies potentially stemming from leaked credentials. 7. Conduct regular audits of local system access and log file permissions to ensure compliance with security policies. 8. Consider deploying application whitelisting and privilege management to reduce the risk of unauthorized local code execution that could exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-12910: Inappropriate implementation in Google Chrome
Description
Inappropriate implementation in Passkeys in Google Chrome prior to 140.0.7339.80 allowed a local attacker to obtain potentially sensitive information via debug logs. (Chromium security severity: Low)
AI-Powered Analysis
Technical Analysis
CVE-2025-12910 is a vulnerability identified in Google Chrome's Passkeys implementation prior to version 140.0.7339.80. The issue stems from an inappropriate implementation that causes sensitive information to be exposed via debug logs accessible to local attackers. Passkeys are a modern authentication mechanism designed to replace passwords with cryptographic credentials, enhancing security. However, in this case, debug logs inadvertently contain sensitive data related to Passkeys, which could include authentication tokens or cryptographic material. The vulnerability is classified under CWE-1295, indicating improper implementation leading to information exposure. The CVSS v3.1 base score is 6.2 (medium severity), with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access but no privileges or user interaction, and impacts confidentiality significantly without affecting integrity or availability. No public exploits have been reported, suggesting limited active exploitation. The flaw primarily threatens confidentiality by allowing local attackers to glean sensitive authentication information, potentially facilitating further attacks or unauthorized access if combined with other vulnerabilities or social engineering. The vulnerability was published on November 7, 2025, and no patch links were provided in the source, but upgrading to Chrome 140.0.7339.80 or later is implied as the fix. This vulnerability highlights the importance of secure logging practices, especially for sensitive authentication components like Passkeys.
Potential Impact
For European organizations, the primary impact of CVE-2025-12910 is the potential leakage of sensitive authentication information through debug logs accessible to local attackers. This could lead to unauthorized access if attackers leverage the exposed data to impersonate users or bypass authentication mechanisms. Organizations with shared or poorly secured workstations, or environments where local access controls are lax, are at higher risk. The vulnerability does not directly affect system integrity or availability, but the confidentiality breach could facilitate subsequent attacks, including lateral movement or privilege escalation. Sectors with high security requirements, such as finance, government, and critical infrastructure, may face increased risk due to the sensitivity of the data potentially exposed. Additionally, organizations relying heavily on Chrome for authentication workflows using Passkeys must prioritize remediation to prevent exploitation. Since exploitation requires local access, remote attackers are less likely to benefit directly, but insider threats or malware with local execution capabilities remain concerns. The absence of known exploits reduces immediate risk but does not eliminate the need for prompt mitigation.
Mitigation Recommendations
1. Upgrade all Google Chrome installations to version 140.0.7339.80 or later as soon as possible to ensure the vulnerability is patched. 2. Restrict local access to systems running vulnerable Chrome versions by enforcing strict physical security and user access controls. 3. Limit access to debug logs by configuring logging settings to avoid storing sensitive Passkey information or by securing log files with appropriate permissions. 4. Implement endpoint detection and response (EDR) solutions to monitor for suspicious local activity that could indicate attempts to access debug logs or exploit the vulnerability. 5. Educate users and administrators about the risks of local access vulnerabilities and the importance of maintaining updated software. 6. Review and harden authentication workflows involving Passkeys to detect anomalies potentially stemming from leaked credentials. 7. Conduct regular audits of local system access and log file permissions to ensure compliance with security policies. 8. Consider deploying application whitelisting and privilege management to reduce the risk of unauthorized local code execution that could exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2025-11-07T23:22:39.260Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690e812b0e7acb8066fb445a
Added to database: 11/7/2025, 11:30:51 PM
Last enriched: 11/15/2025, 12:22:45 AM
Last updated: 12/22/2025, 5:56:36 PM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67443: n/a
MediumCVE-2025-10021: CWE-457: Use of Uninitialized Variable in Open Design Alliance ODA Drawings SDK - All Versions < 2026.12
HighCVE-2025-67826: n/a
HighCVE-2025-61740: CWE-346 Origin Validation Error in Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG
HighCVE-2025-26379: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.