CVE-2025-12447
📋 TL;DR
This vulnerability allows attackers to spoof the Chrome Omnibox (address bar) security UI on Android devices through specific user gestures. Attackers can trick users into believing they're on a legitimate site when they're actually on a malicious page. Only Android users running vulnerable Chrome versions are affected.
💻 Affected Systems
- Google Chrome for Android
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →⚠️ Risk & Real-World Impact
Worst Case
Users could be tricked into entering sensitive information (passwords, credit cards) on phishing sites that appear legitimate due to UI spoofing.
Likely Case
Users might be deceived into clicking malicious links or providing non-critical information to spoofed websites.
If Mitigated
With proper user awareness training and updated browsers, impact is minimal as users should verify URLs before entering sensitive data.
🎯 Exploit Status
Exploitation requires convincing users to perform specific UI gestures on crafted HTML pages, making it less trivial than drive-by attacks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 142.0.7444.59 and later
Vendor Advisory: https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html
Restart Required: Yes
Instructions:
1. Open Google Play Store 2. Search for Chrome 3. Tap Update if available 4. Restart Chrome after update
🔧 Temporary Workarounds
Disable JavaScript
androidPrevents the crafted HTML from executing the UI gesture manipulation
chrome://settings/content/javascript (toggle off)
Use Desktop Mode
androidSwitch to desktop view which may not be vulnerable to the same UI manipulation
Tap menu > Desktop site
🧯 If You Can't Patch
- Educate users to always verify URLs in the Omnibox before entering sensitive information
- Implement web filtering to block known malicious sites that might exploit this vulnerability
🔍 How to Verify
Check if Vulnerable:
Open Chrome > Settings > About Chrome. Check if version is below 142.0.7444.59
Check Version:
chrome://version/
Verify Fix Applied:
Confirm Chrome version is 142.0.7444.59 or higher in Settings > About Chrome
📡 Detection & Monitoring
Log Indicators:
- Unusual user reports of website authenticity confusion
- Increased helpdesk tickets about suspicious browser behavior
Network Indicators:
- Traffic to newly registered domains with similar names to legitimate sites
SIEM Query:
source="chrome_android_logs" AND (event="security_ui_interaction" OR event="omnibox_spoof_attempt")