CVE-2026-0905
Google · Google Chrome
A critical vulnerability has been identified in Google Chrome which could lead to the exposure of sensitive information.
Executive summary
A critical vulnerability has been identified in Google Chrome which could lead to the exposure of sensitive information. The flaw stems from insufficient policy enforcement that fails to properly protect data within network log files. If an attacker gains access to one of these log files, they could extract sensitive data, potentially leading to account compromise, data breaches, and unauthorized access to corporate systems.
Vulnerability
The vulnerability exists within the network logging component of Google Chrome. Due to insufficient policy enforcement, sensitive data such as authentication tokens, session cookies, or other private information transmitted over the network is improperly included in network log files (netlog). An attacker who gains local or remote access to a system and obtains a copy of this log file can parse it to extract this sensitive information. Exploitation is a two-step process: first, the attacker must gain access to the log file, and second, they must extract the exposed data from it.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a severe impact on the business, leading to a significant data breach. Compromised information could include employee or customer credentials, proprietary business data, and personally identifiable information (PII). The consequences of such a breach include unauthorized access to critical internal applications, financial loss, regulatory fines, and substantial reputational damage.
Remediation
Immediate Action: Immediately update all instances of Google Chrome to the patched version 144.0.7559.59 or later. This action should be prioritized for all user endpoints and servers where the browser is installed. Following the update, monitor systems for any signs of exploitation attempts and review access logs for unusual activity related to user profiles or application data folders.
Proactive Monitoring: Implement enhanced monitoring on endpoints to detect suspicious activity. Specifically, monitor for unauthorized access to or exfiltration of files from Google Chrome's user data directories, particularly network log files (e.g., netlog.json). Security teams should also monitor for anomalous user account behavior, such as logins from unusual locations, which could indicate credential compromise.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Harden endpoint security by restricting administrative privileges and limiting read/write access to application data folders. Utilize File Integrity Monitoring (FIM) solutions to alert on any changes or access to Chrome's logging directories. Consider using enterprise policies (GPO) to disable or restrict Chrome's network logging capabilities as a temporary measure.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the critical CVSS score of 9.8, it is strongly recommended that the organization treats this vulnerability with the highest priority. All vulnerable instances of Google Chrome must be updated to a patched version immediately to prevent the potential for sensitive data exposure. Although this vulnerability is not currently listed on the CISA KEV catalog, its severity warrants urgent and decisive remediation to protect against potential data breaches and subsequent impact on the organization.