Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13640: Inappropriate implementation in Google Chrome

0
Low
VulnerabilityCVE-2025-13640cvecve-2025-13640
Published: Tue Dec 02 2025 (12/02/2025, 19:00:16 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in Passwords in Google Chrome prior to 143.0.7499.41 allowed a local attacker to bypass authentication via physical access to the device. (Chromium security severity: Low)

AI-Powered Analysis

AILast updated: 12/02/2025, 19:23:29 UTC

Technical Analysis

CVE-2025-13640 is a security vulnerability identified in Google Chrome's password management implementation prior to version 143.0.7499.41. The issue arises from an inappropriate implementation that allows a local attacker with physical access to the device to bypass authentication mechanisms protecting stored passwords. This means that if an attacker can physically access a device running a vulnerable Chrome version, they could potentially retrieve or misuse saved credentials without needing to authenticate properly. The vulnerability does not appear to be exploitable remotely and does not require user interaction, limiting its attack surface primarily to scenarios involving physical device compromise. The Chromium security team has classified this vulnerability as low severity, likely due to the requirement for physical access and the limited scope of impact. There are no known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability was published on December 2, 2025, and affects Chrome versions before 143.0.7499.41. The lack of patch links suggests that the fixed version is 143.0.7499.41 or later. This vulnerability highlights the importance of securing physical access to devices and timely software updates to prevent unauthorized access to sensitive credentials stored in browsers.

Potential Impact

For European organizations, the primary impact of CVE-2025-13640 is the potential unauthorized access to stored passwords on devices running vulnerable Chrome versions if an attacker gains physical access. This could lead to credential theft, unauthorized access to corporate resources, and potential lateral movement within networks. While the vulnerability does not enable remote exploitation, the risk is significant in environments where devices are shared, lost, or stolen, such as in mobile workforces or public-facing terminals. The breach of stored credentials could compromise user accounts, internal systems, and sensitive data, undermining confidentiality and integrity. Given the widespread use of Chrome across European enterprises and public sector organizations, especially in countries with high Chrome market share, this vulnerability could have a broad impact if not addressed. However, the requirement for physical access and the low severity rating reduce the likelihood of widespread exploitation. Nonetheless, organizations with high-value targets or sensitive data should treat this vulnerability seriously to prevent insider threats or opportunistic attacks.

Mitigation Recommendations

To mitigate CVE-2025-13640, European organizations should immediately update all Chrome installations to version 143.0.7499.41 or later, where the vulnerability is fixed. Beyond patching, organizations should enforce strict physical security controls to prevent unauthorized access to devices, including secure storage, device encryption, and endpoint lockdown policies. Implementing multi-factor authentication (MFA) for accessing sensitive applications can reduce the impact of stolen credentials. Additionally, organizations should consider disabling password saving features in browsers on high-risk or shared devices and encourage the use of dedicated password managers with stronger security controls. Regular audits of device inventory and access logs can help detect potential physical compromise. User training on the risks of leaving devices unattended and the importance of locking screens can further reduce exposure. Finally, integrating endpoint detection and response (EDR) solutions can help identify suspicious local activities indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-11-24T23:26:27.104Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f3888e0601f8fcd7a94e6

Added to database: 12/2/2025, 7:05:44 PM

Last enriched: 12/2/2025, 7:23:29 PM

Last updated: 12/5/2025, 2:22:33 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats