Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely

Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely
Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely
A high-severity security vulnerability has been discovered in Google Chrome’s integrated Gemini AI assistant, exposing users to unauthorized camera and microphone access, local file theft, and phishing attacks, all without requiring any user interaction beyond launching the browser’s built-in AI panel.

Tracked as CVE-2026-0628, the flaw was uncovered by researchers at Palo Alto Networks’ Unit 42 and responsibly disclosed to Google on October 23, 2025. Google confirmed the issue and released a patch on January 5, 2026, prior to public disclosure.

Gemini Live in Chrome is part of a growing class of “AI browsers” that embed AI assistants directly into the browsing environment. These assistants, which also include Microsoft Copilot in Edge and standalone products like Atlas and Comet, operate as privileged side panels capable of real-time webpage summarization, task automation, and contextual browsing assistance.

Because these AI panels need a “multimodal” view of the user’s screen to function effectively, Chrome grants the Gemini panel elevated permissions, including access to the camera, microphone, local files, and screenshot capabilities. This privileged architecture, while enabling powerful features, also dramatically widens the browser’s attack surface.

The flaw resided in how Chrome handled the declarativeNetRequest API a standard browser extension permission that allows extensions to intercept and modify HTTPS web requests and responses. This API is widely used for legitimate purposes, such as ad-blocking.

Researchers found a critical distinction in how Chrome processed requests to hxxps[:]//gemini.google[.]com/app. When that URL loads inside an ordinary browser tab, extensions can intercept and inject JavaScript into it, but this grants no special privileges.

However, when the same URL loads inside the Gemini browser panel, Chrome hooks it with elevated, browser-level capabilities.

Exploiting this inconsistency, a malicious extension using only basic permissions could inject arbitrary JavaScript code into the privileged Gemini panel, effectively hijacking a trusted browser component and inheriting all of its elevated access.

Enables Access to Camera and Microphone

Once an attacker gained control of the Gemini panel via this technique, they could perform the following actions without any user interaction beyond the victim clicking the Gemini button:

Attack Capability Impact
Camera and microphone activation Silent surveillance without user consent
Screenshot capture Exfiltration of sensitive on-screen data
Local file and directory access Theft of OS-level files
Phishing via trusted panel High-credibility deception attacks

The phishing risk is particularly dangerous because the Gemini panel is a trusted, browser-integrated component. Malicious content displayed within it carries an inherent legitimacy that standalone phishing pages lack.

Extension-based attacks have historically been considered lower-risk due to the prerequisites involved in getting a malicious extension installed. However, the integration of privileged AI panels fundamentally changes this calculus.

The number of malicious extensions deployed to browser web stores has grown significantly in recent years. Many are removed quickly, but not before reaching thousands of users.

Additionally, legitimate extensions have been hijacked or sold to threat actors who pushed malicious updates to already-installed endpoints, turning trusted tools into silent weapons.

Within enterprise environments, a compromised extension gaining access to workers’ cameras, microphones, and local files represents a serious organizational security risk, with potential for corporate espionage and data exfiltration.

Google issued a fix on January 5, 2026, following responsible disclosure. Users running the latest version of Chrome are protected. Organizations should ensure Chrome is updated across all endpoints immediately.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading