Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0904: Incorrect security UI in Google Chrome

0
Medium
VulnerabilityCVE-2026-0904cvecve-2026-0904
Published: Tue Jan 20 2026 (01/20/2026, 04:14:16 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Incorrect security UI in Digital Credentials in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 01/20/2026, 04:37:21 UTC

Technical Analysis

CVE-2026-0904 is a security vulnerability identified in Google Chrome versions prior to 144.0.7559.59, related to an incorrect security user interface (UI) implementation within the Digital Credentials feature. The flaw allows a remote attacker to craft a malicious HTML page that can spoof domain information, misleading users into believing they are interacting with a legitimate website when they are not. This domain spoofing can facilitate phishing attacks, credential theft, or other social engineering exploits by undermining the trustworthiness of the browser's security indicators. The vulnerability does not require the attacker to have any prior authentication or elevated privileges, but it does require the victim to visit a maliciously crafted webpage. Although no known exploits have been reported in the wild, the potential for abuse exists given the widespread use of Google Chrome globally. The vulnerability impacts the confidentiality and integrity of user data by enabling attackers to impersonate trusted domains, potentially capturing sensitive information or credentials. The issue was publicly disclosed on January 20, 2026, with no CVSS score assigned yet. The security severity assigned by Chromium is medium, reflecting the moderate risk posed by UI spoofing attacks that rely on user interaction and social engineering. The vulnerability has been addressed in Chrome version 144.0.7559.59, and users are advised to update promptly to mitigate the risk.

Potential Impact

For European organizations, this vulnerability poses a risk primarily through phishing and social engineering attacks that exploit the browser's UI to spoof trusted domains. This can lead to unauthorized disclosure of sensitive information, credential compromise, and potential downstream impacts such as unauthorized access to corporate resources or financial fraud. Organizations with employees who frequently access web-based services or handle sensitive data via Chrome browsers are particularly vulnerable. The impact on confidentiality and integrity is significant, as attackers can deceive users into submitting credentials or sensitive data to malicious sites. Availability is less directly impacted, but successful exploitation could lead to broader security incidents affecting service continuity. The lack of known exploits in the wild reduces immediate risk, but the widespread use of Chrome in Europe and the reliance on digital credentials heighten the potential impact if exploited. Regulatory compliance frameworks such as GDPR also increase the importance of addressing such vulnerabilities promptly to avoid data breaches and associated penalties.

Mitigation Recommendations

1. Immediately update all Google Chrome installations to version 144.0.7559.59 or later to apply the security fix. 2. Implement enterprise-wide browser update policies to ensure timely patching of vulnerabilities. 3. Educate users on recognizing phishing attempts and verifying website authenticity beyond browser UI cues, including checking URLs carefully and using multi-factor authentication. 4. Deploy web filtering solutions that can block access to known malicious sites and suspicious URLs. 5. Monitor network traffic for unusual patterns that may indicate phishing or spoofing attempts. 6. Encourage the use of password managers that autofill credentials only on verified domains to reduce the risk of credential theft. 7. Conduct regular security awareness training emphasizing the risks of UI spoofing and social engineering. 8. For critical systems, consider browser isolation or sandboxing technologies to limit exposure to malicious web content.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-01-13T18:20:17.429Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696f02a94623b1157c1371cf

Added to database: 1/20/2026, 4:20:57 AM

Last enriched: 1/20/2026, 4:37:21 AM

Last updated: 2/7/2026, 12:01:10 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats