Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14373: Inappropriate implementation in Google Chrome

0
Medium
VulnerabilityCVE-2025-14373cvecve-2025-14373
Published: Fri Dec 12 2025 (12/12/2025, 19:20:42 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 12/12/2025, 19:31:35 UTC

Technical Analysis

CVE-2025-14373 is a security vulnerability identified in the Toolbar component of Google Chrome on Android devices running versions prior to 143.0.7499.110. The vulnerability stems from an inappropriate implementation in the Toolbar that allows a remote attacker to craft a malicious HTML page capable of performing domain spoofing. Domain spoofing here means that the attacker can manipulate the browser's UI elements to display a fake domain or URL, misleading users into believing they are visiting a legitimate website when they are not. This can facilitate phishing attacks, credential theft, or other social engineering exploits. The vulnerability does not require any authentication or complex user interaction beyond visiting the malicious page, making it relatively easy to exploit. Although the Chromium security team has rated this vulnerability as medium severity and no public exploits have been reported yet, the risk remains significant due to the potential for user deception. The flaw affects only the Android version of Chrome and was addressed in version 143.0.7499.110. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. The vulnerability impacts confidentiality and integrity by enabling attackers to impersonate trusted domains, potentially leading to data theft or fraud. Availability is not directly affected. The scope is limited to Chrome on Android devices, which are widely used globally, including across Europe.

Potential Impact

For European organizations, the primary impact of CVE-2025-14373 lies in the increased risk of phishing and social engineering attacks facilitated by domain spoofing. Attackers could deceive employees or customers into divulging sensitive information such as login credentials, financial data, or proprietary information by presenting fake websites that appear legitimate. This could lead to unauthorized access, data breaches, financial fraud, and reputational damage. Sectors such as finance, healthcare, government, and e-commerce, which rely heavily on secure web interactions, are particularly vulnerable. The widespread use of Android devices and Google Chrome in Europe amplifies the potential reach of this threat. Additionally, mobile device management (MDM) policies that do not enforce timely browser updates could leave endpoints exposed. While no direct disruption to service availability is expected, the indirect consequences of compromised credentials or data leakage can be severe. The medium severity rating reflects the balance between ease of exploitation and the potential for significant impact on confidentiality and integrity.

Mitigation Recommendations

To mitigate the risk posed by CVE-2025-14373, European organizations should implement the following specific measures: 1) Enforce immediate updates of Google Chrome on all Android devices to version 143.0.7499.110 or later through centralized mobile device management (MDM) solutions to ensure all endpoints are patched promptly. 2) Deploy browser security policies that restrict or monitor access to untrusted or suspicious websites, reducing exposure to malicious HTML pages. 3) Conduct targeted user awareness training focused on recognizing phishing attempts and domain spoofing tactics, emphasizing caution when interacting with links or websites on mobile devices. 4) Utilize advanced endpoint protection tools capable of detecting and blocking malicious web content or scripts that attempt to exploit browser vulnerabilities. 5) Implement multi-factor authentication (MFA) across critical systems to reduce the impact of credential theft resulting from spoofing attacks. 6) Monitor network traffic and logs for unusual access patterns or signs of phishing campaigns targeting the organization. 7) Collaborate with security vendors and threat intelligence providers to stay informed about any emerging exploits or related threats. These steps go beyond generic advice by focusing on patch management, user education, and proactive detection tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-12-09T18:47:04.086Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c6bdfa3f11564d0c8e407

Added to database: 12/12/2025, 7:24:15 PM

Last enriched: 12/12/2025, 7:31:35 PM

Last updated: 12/15/2025, 3:54:56 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats