Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0905: Insufficient policy enforcement in Google Chrome

0
Critical
VulnerabilityCVE-2026-0905cvecve-2026-0905
Published: Tue Jan 20 2026 (01/20/2026, 04:14:16 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2026-0905 is a critical vulnerability in Google Chrome prior to version 144. 0. 7559. 59 involving insufficient policy enforcement in the network logging feature. This flaw allows an attacker who gains access to a network log file to extract sensitive information, potentially compromising confidentiality, integrity, and availability. The vulnerability has a high CVSS score of 9. 8, indicating it is remotely exploitable without authentication or user interaction. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make timely patching essential. European organizations using vulnerable Chrome versions are at risk of data leakage and potential further exploitation. Mitigation involves immediate updating to Chrome 144.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:19:20 UTC

Technical Analysis

CVE-2026-0905 is a critical security vulnerability identified in Google Chrome versions prior to 144.0.7559.59. The issue stems from insufficient policy enforcement in the network logging component of the browser. Specifically, an attacker who can obtain access to a network log file generated by Chrome may be able to extract sensitive information contained within these logs. Network logs often include detailed records of network requests, responses, headers, and potentially sensitive metadata, which could expose confidential user data or internal network details. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and has a CVSS v3.1 base score of 9.8, reflecting its critical impact. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and affects confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits have been observed in the wild yet, the vulnerability’s characteristics make it highly exploitable. The root cause is inadequate enforcement of access control policies on network log files, allowing unauthorized parties to access sensitive logs. This flaw could be leveraged by attackers who gain access to a system or network segment where Chrome logs are stored or transmitted. The vulnerability was publicly disclosed on January 20, 2026, and users are advised to upgrade to Chrome version 144.0.7559.59 or later, where the issue has been addressed. The lack of patch links in the provided data suggests the update is integrated into the official Chrome release rather than a separate patch. Organizations relying heavily on Chrome for web access and internal applications should consider this vulnerability a high priority for remediation.

Potential Impact

For European organizations, the impact of CVE-2026-0905 is significant due to the widespread use of Google Chrome across enterprises, government agencies, and critical infrastructure sectors. Exposure of sensitive network logs can lead to unauthorized disclosure of confidential information such as internal IP addresses, authentication tokens, session identifiers, or other metadata that could facilitate further attacks like lateral movement, credential theft, or targeted espionage. This is particularly concerning for sectors handling sensitive personal data (e.g., healthcare, finance) or critical infrastructure (e.g., energy, transportation). The vulnerability’s remote exploitability without authentication increases the risk surface, especially in environments where network logs might be accessible over shared drives, backup systems, or improperly secured endpoints. Additionally, the compromise of network logs can undermine incident response and forensic investigations by exposing or tampering with audit trails. European organizations operating under strict data protection regulations such as GDPR face potential compliance risks and reputational damage if sensitive data is leaked due to this vulnerability. The critical severity rating underscores the urgency for organizations to assess their exposure and implement mitigations promptly.

Mitigation Recommendations

1. Immediate upgrade to Google Chrome version 144.0.7559.59 or later to ensure the vulnerability is patched. 2. Audit and restrict access permissions to network log files, ensuring only authorized personnel and systems can access them. 3. Implement network segmentation and access controls to limit exposure of systems storing or transmitting Chrome network logs. 4. Monitor file access logs and network traffic for unusual or unauthorized access attempts to network log files. 5. Educate IT and security teams about the vulnerability to recognize potential exploitation indicators. 6. Where feasible, disable or limit network logging features in Chrome for sensitive environments until patched versions are deployed. 7. Incorporate this vulnerability into vulnerability management and incident response workflows to ensure timely detection and remediation. 8. Review backup and archival processes to ensure network logs are securely stored and encrypted. 9. Coordinate with endpoint security solutions to detect anomalous behavior related to log file access or exfiltration attempts. 10. Engage with Google’s security advisories and update channels to stay informed about any further developments or patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-01-13T18:20:17.734Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696f02a94623b1157c1371d3

Added to database: 1/20/2026, 4:20:57 AM

Last enriched: 1/27/2026, 8:19:20 PM

Last updated: 2/6/2026, 6:59:39 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats