Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3925: Incorrect security UI in Google Chrome

0
Medium
VulnerabilityCVE-2026-3925cvecve-2026-3925
Published: Wed Mar 11 2026 (03/11/2026, 22:04:08 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Incorrect security UI in LookalikeChecks in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 03/12/2026, 15:14:54 UTC

Technical Analysis

CVE-2026-3925 is a vulnerability identified in Google Chrome for Android, specifically affecting versions prior to 146.0.7680.71. The flaw lies in the LookalikeChecks security UI component, which is designed to detect and warn users about deceptive URLs that resemble legitimate sites. Due to incorrect UI rendering or logic, an attacker can craft a malicious HTML page that spoofs the browser's security indicators, misleading users into believing they are interacting with a trusted site. This UI spoofing attack can facilitate phishing or social engineering by presenting false security cues. The vulnerability is remotely exploitable without requiring any privileges or authentication, but it does require user interaction, such as visiting a malicious webpage. The CVSS v3.1 score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but acknowledging the potential integrity risk through UI deception. No known exploits have been reported in the wild, and Google has addressed the issue in Chrome version 146.0.7680.71. The underlying weakness corresponds to CWE-451, which relates to incorrect display of UI elements that can mislead users.

Potential Impact

The primary impact of this vulnerability is on the integrity of the user interface, which can undermine user trust and facilitate phishing attacks. By spoofing security UI elements, attackers can trick users into divulging sensitive information such as credentials or financial data, or performing unsafe actions under false pretenses. Although the vulnerability does not directly compromise confidentiality or availability, the indirect consequences can be significant, especially in environments where users rely heavily on Chrome for secure browsing. Organizations with large Android user bases may face increased phishing risks and potential data breaches stemming from successful social engineering. The lack of known exploits reduces immediate risk, but the widespread use of Chrome on Android devices globally means the attack surface is large. This vulnerability could be leveraged in targeted attacks against high-value individuals or organizations.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should promptly update Google Chrome on Android devices to version 146.0.7680.71 or later, where the issue is fixed. Enterprises managing fleets of Android devices should enforce update policies via mobile device management (MDM) solutions to ensure timely patch deployment. Additionally, user education on recognizing phishing attempts and suspicious UI elements remains critical, as UI spoofing attacks rely on user interaction. Developers and security teams should monitor for any emerging exploits or phishing campaigns leveraging this vulnerability. Implementing multi-factor authentication (MFA) can reduce the impact of credential theft resulting from phishing. Finally, security teams should consider deploying browser security extensions or solutions that provide additional phishing detection and URL validation beyond the browser's native capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-11T05:54:11.224Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b2d4ee2f860ef943a58d74

Added to database: 3/12/2026, 2:59:58 PM

Last enriched: 3/12/2026, 3:14:54 PM

Last updated: 3/14/2026, 2:25:20 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses