CVE-2025-1566 (GCVE-0-2025-1566)
Vulnerability from cvelistv5
Published
2025-04-16 23:06
Modified
2025-05-08 19:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Network Security Isolation (NSI)
Summary
DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 16002.23.0 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions.
References
▼ | URL | Tags | |
---|---|---|---|
7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f | https://issues.chromium.org/issues/b/342802975 | Broken Link | |
7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f | https://issuetracker.google.com/issues/342802975 | Issue Tracking, Mailing List |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-1566", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T13:32:48.693962Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1319", "description": "CWE-1319 Improper Protection against Electromagnetic Fault Injection (EM-FI)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-07T19:45:29.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ChromeOS", "vendor": "Google", "versions": [ { "lessThan": "16002.23.0", "status": "affected", "version": "16002.23.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 16002.23.0 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions." } ], "problemTypes": [ { "descriptions": [ { "description": "Network Security Isolation (NSI)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-08T19:15:06.169Z", "orgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "shortName": "ChromeOS" }, "references": [ { "url": "https://issuetracker.google.com/issues/342802975" }, { "url": "https://issues.chromium.org/issues/b/342802975" } ] } }, "cveMetadata": { "assignerOrgId": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", "assignerShortName": "ChromeOS", "cveId": "CVE-2025-1566", "datePublished": "2025-04-16T23:06:27.847Z", "dateReserved": "2025-02-21T21:30:53.937Z", "dateUpdated": "2025-05-08T19:15:06.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-1566\",\"sourceIdentifier\":\"7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f\",\"published\":\"2025-04-16T23:15:44.767\",\"lastModified\":\"2025-07-08T18:08:30.527\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 16002.23.0 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions.\"},{\"lang\":\"es\",\"value\":\"Una fuga de DNS en el sistema VPN nativo del canal de desarrollo de Google ChromeOS en ChromeOS 129.0.6668.36 permite que los observadores de la red expongan consultas DNS de texto simple debido a una falla en la tunelizaci\u00f3n adecuada del tr\u00e1fico DNS durante las transiciones de estado de VPN.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1319\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:chrome_os:16002.23.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91F38647-41B2-4175-B80D-FF0F05BC9364\"}]}]}],\"references\":[{\"url\":\"https://issues.chromium.org/issues/b/342802975\",\"source\":\"7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://issuetracker.google.com/issues/342802975\",\"source\":\"7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f\",\"tags\":[\"Issue Tracking\",\"Mailing List\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-1566\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-17T13:32:48.693962Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1319\", \"description\": \"CWE-1319 Improper Protection against Electromagnetic Fault Injection (EM-FI)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-17T15:14:28.569Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Google\", \"product\": \"ChromeOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"16002.23.0\", \"lessThan\": \"16002.23.0\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://issuetracker.google.com/issues/342802975\"}, {\"url\": \"https://issues.chromium.org/issues/b/342802975\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 16002.23.0 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Network Security Isolation (NSI)\"}]}], \"providerMetadata\": {\"orgId\": \"7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f\", \"shortName\": \"ChromeOS\", \"dateUpdated\": \"2025-05-08T19:15:06.169Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-1566\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-08T19:15:06.169Z\", \"dateReserved\": \"2025-02-21T21:30:53.937Z\", \"assignerOrgId\": \"7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f\", \"datePublished\": \"2025-04-16T23:06:27.847Z\", \"assignerShortName\": \"ChromeOS\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…