CVE-2025-1917

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to spoof browser UI elements in Google Chrome on Android, potentially tricking users into interacting with malicious content disguised as legitimate browser controls. It affects Android users running Chrome versions before 134.0.6998.35. The attack requires user interaction with a crafted HTML page.

💻 Affected Systems

Products:
  • Google Chrome
Versions: Prior to 134.0.6998.35
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Chrome on Android; desktop Chrome and other browsers are not affected.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into entering sensitive information into fake browser dialogs, clicking malicious buttons disguised as legitimate controls, or approving dangerous actions they believe are safe browser operations.

🟠

Likely Case

Phishing attacks where attackers create convincing fake browser UI elements to steal credentials or trick users into downloading malware.

🟢

If Mitigated

With updated Chrome and user awareness training, impact is minimal as users can recognize suspicious UI behavior and the vulnerability is patched.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction with a malicious webpage; no authentication needed to initiate attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 134.0.6998.35 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Google Play Store on Android device. 2. Search for 'Google Chrome'. 3. If update available, tap 'Update'. 4. After update completes, restart Chrome browser.

🔧 Temporary Workarounds

Disable JavaScript

android

Prevents execution of malicious scripts that could exploit the UI spoofing vulnerability.

chrome://settings/content/javascript

Use Desktop Mode

android

Switch to desktop version of websites which may bypass mobile-specific UI spoofing techniques.

Tap menu > Desktop site

🧯 If You Can't Patch

  • Deploy web filtering to block known malicious sites that could host exploit pages
  • Implement user awareness training about phishing and UI spoofing techniques

🔍 How to Verify

Check if Vulnerable:

Open Chrome, go to Settings > About Chrome, check if version is below 134.0.6998.35

Check Version:

chrome://version/

Verify Fix Applied:

After updating, confirm Chrome version is 134.0.6998.35 or higher in Settings > About Chrome

📡 Detection & Monitoring

Log Indicators:

  • Unusual user reports of suspicious browser dialogs or UI elements
  • Multiple failed authentication attempts from same user session

Network Indicators:

  • Traffic to known malicious domains hosting HTML pages with unusual UI elements
  • Increased visits to phishing-like sites from Chrome Android clients

SIEM Query:

source="chrome_android_logs" AND (event="suspicious_ui_interaction" OR event="unexpected_dialog")

🔗 References

📤 Share & Export