CVE-2025-1566

7.5 HIGH

📋 TL;DR

A DNS leak vulnerability in ChromeOS's native VPN implementation allows network observers to intercept plaintext DNS queries during VPN state transitions. This affects ChromeOS Dev Channel users running version 16002.23.0, potentially exposing their browsing activity and visited domains.

💻 Affected Systems

Products:
  • Google ChromeOS
Versions: ChromeOS 16002.23.0 (Dev Channel only)
Operating Systems: ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects ChromeOS Dev Channel; stable and beta channels are not vulnerable. Requires using the native system VPN feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers on the same network could monitor all DNS queries, mapping user activity, visited domains, and potentially infer sensitive information about browsing habits or organizational access patterns.

🟠

Likely Case

Network observers in public Wi-Fi or shared networks could see which websites users visit, potentially compromising privacy and exposing browsing history.

🟢

If Mitigated

With proper network segmentation and encrypted DNS (DoH/DoT), exposure is limited to metadata about DNS query timing and volume rather than specific domains.

🌐 Internet-Facing: MEDIUM - Requires attacker to be on same network segment; not directly exploitable over internet but affects users on public networks.
🏢 Internal Only: LOW - Internal networks typically have controlled access; risk primarily exists in shared or public network environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access but no authentication; attackers simply need to monitor network traffic during VPN transitions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to ChromeOS Dev Channel version >16002.23.0

Vendor Advisory: https://issues.chromium.org/issues/b/342802975

Restart Required: Yes

Instructions:

1. Open ChromeOS Settings 2. Navigate to 'About ChromeOS' 3. Click 'Check for updates' 4. Install available update 5. Restart device when prompted

🔧 Temporary Workarounds

Switch to Stable Channel

all

Move from Dev Channel to Stable Channel to avoid this vulnerability entirely

chrome://settings/help
Click 'Additional details'
Change channel to 'Stable'
Check for updates and restart

Use Third-Party VPN Client

all

Use a third-party VPN application instead of the native ChromeOS VPN feature

🧯 If You Can't Patch

  • Avoid using public Wi-Fi networks while connected to VPN
  • Configure DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT) to encrypt DNS queries independently

🔍 How to Verify

Check if Vulnerable:

Check ChromeOS version: Settings > About ChromeOS > Detailed build information; if version is exactly 16002.23.0 on Dev Channel, device is vulnerable.

Check Version:

cat /etc/lsb-release | grep CHROMEOS_RELEASE_VERSION

Verify Fix Applied:

After update, verify ChromeOS version is >16002.23.0; test VPN connection and monitor DNS traffic to confirm queries are properly tunneled.

📡 Detection & Monitoring

Log Indicators:

  • DNS queries appearing from ChromeOS device IP when VPN should be active
  • VPN connection state change logs without corresponding DNS tunnel establishment

Network Indicators:

  • Plaintext DNS queries (port 53) originating from ChromeOS devices during VPN sessions
  • DNS traffic bypassing VPN tunnel interface

SIEM Query:

source="network_dns" dest_port=53 src_ip=CHROMEOS_DEVICE_IP NOT vpn_tunnel="established"

🔗 References

📤 Share & Export