{"id":12323,"date":"2026-03-02T16:01:03","date_gmt":"2026-03-02T16:01:03","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12323"},"modified":"2026-03-02T16:01:03","modified_gmt":"2026-03-02T16:01:03","slug":"vulnerability-allowed-hijacking-chromes-gemini-dwell-ai-assistant","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12323","title":{"rendered":"Vulnerability Allowed Hijacking Chrome&#8217;s Gemini Dwell AI Assistant"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>A vulnerability in Chrome may have allowed malicious extensions to hijack the browser\u2019s AI assistant to spy on customers and exfiltrate knowledge, Palo Alto Networks studies.<\/strong><\/p>\n<p>Chrome\u2019s aspect panel AI assistant, referred to as Gemini Dwell, was designed to assist customers by summarizing content material in actual time, routinely executing particular duties, and aiding with the contextual understanding of the energetic webpage.<\/p>\n<p>\u201cBy granting the AI direct, privileged entry to the looking atmosphere, AI browsers are able to performing advanced, multi-step operations that had been beforehand not possible or required a number of extensions and guide steps,\u201d Palo Alto Networks <a rel=\"nofollow\" target=\"_blank\" href=\"http:\/\/unit42.paloaltonetworks.com\/gemini-live-in-chrome-hijacking\">explains<\/a>.<\/p>\n<p>To perform as meant, the AI primarily sees what the person sees on the display and makes use of the online web page for context and directions, and this expanded functionality and privileged entry open the door to new dangers.<\/p>\n<p>The vulnerability that Palo Alto Networks uncovered, tracked as CVE-2026-0628 and patched in January in Chrome 143, may have allowed malicious browser extensions to inject JavaScript code into the Gemini Dwell panel.<\/p>\n<p>The malicious extension, the cybersecurity agency explains, would require entry to a permission set by means of the declarativeNetRequests API, which permits extensions to intercept and alter HTTPS net requests and responses.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p>The potential is supposed for professional functions, reminiscent of blocking malicious or intrusive requests, and is enabled by default for extensions to work together with content material originating from Gemini and loaded within the web site\u2019s tab.<\/p>\n<p>CVE-2026-0628, Palo Alto Networks says, impacted the power to work together with the contents loaded inside the Gemini panel, which means that JavaScript code would achieve entry to the AI\u2019s capabilities.<\/p>\n<p>\u201cThese embrace with the ability to learn native information, take screenshots, entry the digicam and microphone and extra, so the app may carry out advanced duties. With the ability to intercept it underneath that setting would have allowed attackers to realize entry to those powers too,\u201d Palo Alto Networks explains.<\/p>\n<p>As a result of the Gemini Dwell panel is a part of the browser itself, an attacker may have injected code to start out the digicam and microphone with out person consent, to entry native information, to take screenshots of browser tabs, and to hijack the panel and carry out a phishing assault.<\/p>\n<p>\u201cBecause the Gemini app depends on performing actions for professional functions, hijacking the Gemini panel permits privileged entry to system sources that an extension wouldn&#8217;t usually have,\u201d Palo Alto Networks explains.<\/p>\n<p>The cybersecurity agency reported the bug to Google in October. A repair was<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/chromereleases.googleblog.com\/2026\/01\/stable-channel-update-for-desktop.html\"> rolled out<\/a> in Chrome variations 143.0.7499.192\/.193 for Home windows and macOS, and Chrome model 143.0.7499.192 for Linux.<\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/google-working-towards-quantum-safe-chrome-https-certificates\/\">Google Working In the direction of Quantum-Protected Chrome HTTPS Certificates<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/promptspy-android-malware-abuses-gemini-ai-at-runtime-for-persistence\/\">PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/over-300-malicious-chrome-extensions-caught-leaking-or-stealing-user-data\/\">Over 300 Malicious Chrome Extensions Caught Leaking or Stealing Consumer Knowledge<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/chrome-edge-extensions-caught-stealing-chatgpt-sessions\/\">Chrome, Edge Extensions Caught Stealing ChatGPT Periods<\/a>\n\t\t\t<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>A vulnerability in Chrome may have allowed malicious extensions to hijack the browser\u2019s AI assistant to spy on customers and exfiltrate knowledge, Palo Alto Networks studies. Chrome\u2019s aspect panel AI assistant, referred to as Gemini Dwell, was designed to assist customers by summarizing content material in actual time, routinely executing particular duties, and aiding with [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1621,122,8058,295,7735,1732,1061],"class_list":["post-12323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-allowed","tag-assistant","tag-chromes","tag-gemini","tag-hijacking","tag-live","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12323"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12323\/revisions"}],"predecessor-version":[{"id":12324,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12323\/revisions\/12324"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12325"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-21 06:14:01 UTC -->