Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12910: Inappropriate implementation in Google Chrome

0
Medium
VulnerabilityCVE-2025-12910cvecve-2025-12910
Published: Fri Nov 07 2025 (11/07/2025, 23:23:39 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in Passkeys in Google Chrome prior to 140.0.7339.80 allowed a local attacker to obtain potentially sensitive information via debug logs. (Chromium security severity: Low)

AI-Powered Analysis

AILast updated: 11/15/2025, 00:22:45 UTC

Technical Analysis

CVE-2025-12910 is a vulnerability identified in Google Chrome's Passkeys implementation prior to version 140.0.7339.80. The issue stems from an inappropriate implementation that causes sensitive information to be exposed via debug logs accessible to local attackers. Passkeys are a modern authentication mechanism designed to replace passwords with cryptographic credentials, enhancing security. However, in this case, debug logs inadvertently contain sensitive data related to Passkeys, which could include authentication tokens or cryptographic material. The vulnerability is classified under CWE-1295, indicating improper implementation leading to information exposure. The CVSS v3.1 base score is 6.2 (medium severity), with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access but no privileges or user interaction, and impacts confidentiality significantly without affecting integrity or availability. No public exploits have been reported, suggesting limited active exploitation. The flaw primarily threatens confidentiality by allowing local attackers to glean sensitive authentication information, potentially facilitating further attacks or unauthorized access if combined with other vulnerabilities or social engineering. The vulnerability was published on November 7, 2025, and no patch links were provided in the source, but upgrading to Chrome 140.0.7339.80 or later is implied as the fix. This vulnerability highlights the importance of secure logging practices, especially for sensitive authentication components like Passkeys.

Potential Impact

For European organizations, the primary impact of CVE-2025-12910 is the potential leakage of sensitive authentication information through debug logs accessible to local attackers. This could lead to unauthorized access if attackers leverage the exposed data to impersonate users or bypass authentication mechanisms. Organizations with shared or poorly secured workstations, or environments where local access controls are lax, are at higher risk. The vulnerability does not directly affect system integrity or availability, but the confidentiality breach could facilitate subsequent attacks, including lateral movement or privilege escalation. Sectors with high security requirements, such as finance, government, and critical infrastructure, may face increased risk due to the sensitivity of the data potentially exposed. Additionally, organizations relying heavily on Chrome for authentication workflows using Passkeys must prioritize remediation to prevent exploitation. Since exploitation requires local access, remote attackers are less likely to benefit directly, but insider threats or malware with local execution capabilities remain concerns. The absence of known exploits reduces immediate risk but does not eliminate the need for prompt mitigation.

Mitigation Recommendations

1. Upgrade all Google Chrome installations to version 140.0.7339.80 or later as soon as possible to ensure the vulnerability is patched. 2. Restrict local access to systems running vulnerable Chrome versions by enforcing strict physical security and user access controls. 3. Limit access to debug logs by configuring logging settings to avoid storing sensitive Passkey information or by securing log files with appropriate permissions. 4. Implement endpoint detection and response (EDR) solutions to monitor for suspicious local activity that could indicate attempts to access debug logs or exploit the vulnerability. 5. Educate users and administrators about the risks of local access vulnerabilities and the importance of maintaining updated software. 6. Review and harden authentication workflows involving Passkeys to detect anomalies potentially stemming from leaked credentials. 7. Conduct regular audits of local system access and log file permissions to ensure compliance with security policies. 8. Consider deploying application whitelisting and privilege management to reduce the risk of unauthorized local code execution that could exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-11-07T23:22:39.260Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690e812b0e7acb8066fb445a

Added to database: 11/7/2025, 11:30:51 PM

Last enriched: 11/15/2025, 12:22:45 AM

Last updated: 12/22/2025, 5:56:36 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats