CVE-2025-14373

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to spoof website domains in the Chrome toolbar on Android devices, potentially tricking users into believing they're on legitimate sites. It affects Android users running Chrome versions before 143.0.7499.110.

💻 Affected Systems

Products:
  • Google Chrome for Android
Versions: All versions prior to 143.0.7499.110
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Chrome on Android; desktop Chrome and other browsers are not vulnerable.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into entering sensitive information (passwords, financial data) on malicious sites that appear legitimate in the address bar.

🟠

Likely Case

Phishing attacks where users are deceived into visiting fake versions of legitimate websites due to toolbar display manipulation.

🟢

If Mitigated

Users who verify URLs carefully or use additional security measures would be less likely to fall victim, though the visual deception remains.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (visiting a crafted HTML page) but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 143.0.7499.110 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html

Restart Required: Yes

Instructions:

1. Open Chrome on Android. 2. Go to Settings > About Chrome. 3. Chrome will automatically check for and install updates. 4. Restart Chrome if prompted.

🔧 Temporary Workarounds

Disable JavaScript (temporary)

android

Prevents the crafted HTML from executing the toolbar manipulation, though this breaks many websites.

Settings > Site settings > JavaScript > Block

Use alternative browser

android

Switch to a different browser until Chrome is updated.

🧯 If You Can't Patch

  • Educate users to manually verify URLs by tapping the address bar to see the full URL before entering sensitive information.
  • Implement network filtering to block known malicious domains that might host exploit pages.

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: Open Chrome > Settings > About Chrome. If version is below 143.0.7499.110, the device is vulnerable.

Check Version:

Not applicable for Android GUI; use Settings > About Chrome.

Verify Fix Applied:

Confirm Chrome version is 143.0.7499.110 or higher after updating.

📡 Detection & Monitoring

Log Indicators:

  • Unusual toolbar display anomalies reported by users
  • Increased reports of phishing attempts

Network Indicators:

  • Traffic to domains hosting crafted HTML pages with unusual toolbar manipulation scripts

SIEM Query:

Not typically applicable for client-side browser vulnerabilities on mobile devices.

🔗 References

📤 Share & Export