CVE-2025-1122
📋 TL;DR
An out-of-bounds write vulnerability in the TPM2 reference library in ChromeOS allows attackers with root access to bypass operating system verification and gain persistence. This affects Google ChromeOS 15753.50.0 stable on Cr50 boards. The vulnerability is exploitable during the Challenge-Response process via NV_Read functionality.
💻 Affected Systems
- Google ChromeOS
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →⚠️ Risk & Real-World Impact
Worst Case
Attacker gains persistent root-level access, bypasses OS verification, and maintains control even after system reboots or updates.
Likely Case
Privileged attacker already with root access escalates persistence capabilities to survive OS verification checks.
If Mitigated
With proper access controls preventing root compromise, the vulnerability cannot be exploited.
🎯 Exploit Status
Exploitation requires root access first, then specific knowledge of TPM2 Challenge-Response process.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check ChromeOS updates beyond 15753.50.0
Vendor Advisory: https://issuetracker.google.com/issues/324336238
Restart Required: Yes
Instructions:
1. Open ChromeOS Settings 2. Navigate to About ChromeOS 3. Check for updates 4. Apply any available updates 5. Restart the device
🔧 Temporary Workarounds
Restrict root access
allImplement strict access controls to prevent unauthorized root access
🧯 If You Can't Patch
- Implement strict access controls and monitoring for root account usage
- Isolate affected devices from critical networks and monitor for suspicious TPM activity
🔍 How to Verify
Check if Vulnerable:
Check ChromeOS version via Settings > About ChromeOS. If version is 15753.50.0, device is vulnerable.
Check Version:
cat /etc/lsb-release | grep CHROMEOS_RELEASE_VERSION
Verify Fix Applied:
After update, verify ChromeOS version is newer than 15753.50.0
📡 Detection & Monitoring
Log Indicators:
- Unusual TPM2 NV_Read operations
- Multiple failed OS verification attempts
- Unexpected root access patterns
Network Indicators:
- Unusual outbound connections from ChromeOS devices with root access
SIEM Query:
source="chromeos" AND (event="tpm_nv_read" OR event="os_verification_failure")