Flaw in Chrome’s Gemini Live gave attackers access to user cameras and microphones
The in-browser AI assistant loads differently in the side panel, rather than a regular tab, exposing users to risks
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
A high-severity vulnerability in Google’s Gemini Live in-browser AI assistant created significant privacy and security risks for Chrome users.
Gemini Live runs in a side panel, summarizing web content in real time and handling tasks like automated actions, and requires deep, privileged access to the browsing environment, including media devices and files.
The flaw, tracked as CVE-2026-0628, allows malicious extensions with basic permissions to 'hijack' the new feature, giving attackers access to webcams, microphones, and private files.
Palo Alto Unit 42 researchers said this vulnerability could have allowed malicious browser extensions with only basic permissions to escalate privileges and access the victim's camera and microphone without consent.
Thereafter, a threat actor could take screenshots of any website and access local files and directories.
“Today’s agentic browsers can act on your behalf — researching, reasoning and taking action without direct user input. While this can deliver meaningful productivity gains, in the absence of enterprise-grade controls these tools can take autonomous actions beyond IT oversight," warned Anupam Upadhyaya, SVP, product management, Prisma SASE, Palo Alto Networks.
"By inheriting a user’s browser session and accessing screens, files, cameras and microphones, agentic browsers can expand the attack surface through prompt manipulation and weakened web isolation, creating security and accountability gaps enterprises haven’t faced before."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
How the Gemini Live flaw works
Researchers found that an extension with access to a basic permission set through the declarativeNetRequests API could have enabled an attacker to inject JavaScript code into the new Gemini panel.
The API allows extensions to intercept and change properties of HTTPS web requests and responses – needed for legitimate purposes, such as allowing AdBlock to stop requests that could lead to privacy-undermining ads.
However, when loaded within the new side panel, rather than a standard tab, a flaw emerges in the ability to intercept and change properties of hxxps[:]//gemini.google[.]com/app.
As a result, attackers could run arbitrary code at hxxps[:]//gemini.google[.]com/app under the new Gemini browser panel. As a privileged component of the browser itself, code running within the Gemini panel could access capabilities unavailable to the extension that injected the code initially.
Attackers could start the camera and microphone of the browser without asking for user consent, reach local files and directories of the underlying operating system, take screenshots of tabs showing any website that serves over HTTPS, and hijack the panel into carrying out a phishing attack.
"Innovation can’t come at the expense of security," said Upadhyaya. "If organizations choose to deploy agentic browsers, they must treat them as high-risk infrastructure, with runtime visibility, enforced policy controls and hardened guardrails built in from day one. Anything less invites compromise.”
Unit 42 shared the issue with Google in October via coordinated vulnerability disclosure, with Google releasing a fix in early January.
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
DIY hackers are turning to ‘flat-pack’ malware components to speed up attacks and cut costsNews While these malware campaigns are very basic, researchers noted “they still work”
-
Russian DDoS: what’s the threat to businesses?In-depth The UK National Cyber Security Centre (NCSC) has issued a warning that Russian-aligned hacktivist groups are targeting organizations
-
Former Google engineer convicted of economic espionage after stealing thousands of secret AI, supercomputing documentsNews Linwei Ding told Chinese investors he could build a world-class supercomputer
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Google wants to take hackers to courtNews You don't have a package waiting for you, it's a scam – and Google is fighting back
-
Google says reports of a 'huge' Gmail breach affecting millions of users are false, againNews Reports of a major Gmail affecting millions of users have been flooding the web this week – Google says they're "false" and you've nothing to worry about.
-
This new Android attack could let hackers swipe 2FA codes and snoop on private messages – ‘Pixnapping’ affects Samsung and Google smartphones, but experts warn more could be at riskNews Pixnapping allows attackers to steal two-factor authentication (2FA) codes, private messages, and even financial information.
-
Google hits back at 'entirely false' reports of major Gmail security breachNews Reports of a massive Gmail hack affecting billions of users have been denied by Google
-
Google cyber researchers were tracking the ShinyHunters group’s Salesforce attacks – then realized they’d also fallen victimNews In an update to an investigation on the ShinyHunters group, Google revealed it had also been affected
-
A flaw in Google’s new Gemini CLI tool could’ve allowed hackers to exfiltrate dataNews The company has moved to fix a vulnerability that allowed the execution of malicious code
