Chrome flaw let extensions hijack Gemini’s camera, mic, and file access
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。好的,首先我需要通读整篇文章,抓住主要信息。 文章讲的是Chrome的Gemini面板有一个高危漏洞,编号是CVE-2026-0628。这个漏洞让低权限的扩展程序能够注入代码到Gemini侧边栏,从而获得强大的功能,比如访问本地文件、截图、控制摄像头和麦克风。这个漏洞已经被修复了,但作者还提到AI浏览器打破了传统的隔离边界,使得扩展滥用、注入攻击和钓鱼攻击变得更危险。 接下来,文章详细说明了这个漏洞是如何被利用的:通过declarativeNetRequest API拦截Gemini的流量,注入JavaScript代码,进而控制高权限组件。修复是在2026年1月完成的。此外,作者还建议用户减少安装扩展,并注意权限变化和异常行为。 所以,总结的时候需要包括:Chrome Gemini面板的高危漏洞、低权限扩展如何利用该漏洞获取高权限功能、修复时间以及AI浏览器带来的安全风险。 现在我要把这些信息浓缩到100字以内。可能需要去掉一些细节,比如具体的API名称或修复的具体时间点。但要确保关键点都涵盖进去:漏洞名称、影响、修复情况以及AI浏览器的风险。 最后检查一下字数是否符合要求,并且表达清晰。 </think> Chrome 的 Gemini 面板存在高危漏洞(CVE-2026-0628),允许低权限扩展注入代码并获取高权限功能如文件访问、截图及摄像头/麦克风控制。该漏洞已修复(2026 年 1 月),但 AI 浏览器打破了传统隔离边界,使扩展滥用和钓鱼攻击更危险。 2026-3-3 12:10:19 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

Chrome’s Gemini “Live in Chrome” panel (Gemini’s embedded, agent-style assistant mode within Chrome) had a high‑severity vulnerability tracked as CVE‑2026‑0628. The flaw let a low‑privilege extension inject code into the Gemini side panel and inherit its powerful capabilities, including local file access, screenshots, and camera/microphone control.

The vulnerability was patched in a January update. But the deeper story is that AI or agentic browsers are stepping outside long‑standing isolation boundaries, so extension abuse, prompt injection, and trusted‑UI phishing all become much more dangerous.

Chrome’s Gemini “Live in Chrome” panel runs the Gemini web app in a special, privileged side panel that can see what’s on screen and perform actions like reading local files, taking screenshots, and using the camera and microphone to automate tasks.

Researchers found that an extension using the declarativeNetRequest API (Application Programming Interface) could tamper with traffic to gemini.google.com/app when it loaded inside this side panel, not just in a normal tab.

As a result, a basic‑permission extension could inject JavaScript into a high‑privilege browser component and start camera and microphone without new consent prompts, enumerate local files and directories, take screenshots of any HTTPS site, and even turn the Gemini panel itself into a phishing UI.

Normally, extensions cannot control other extensions or core browser components, but due to this vulnerability, a low‑privilege extension could effectively drive a privileged AI assistant and inherit its powers.

And because the Gemini panel is a trusted part of the Chrome browser, users would not expect it to silently activate camera or microphone or scrape local files at an extension’s whim.

Therefore, it is good to be aware that agentic browsers, such as Gemini in Chrome, Copilot in Edge, Atlas, Comet, etc., embed an AI side panel that sees page content, keeps context, and can autonomously execute multi‑step actions like summarization, form‑filling, and automation.

These assistants need broad access to the web pages you’re looking at, including everything you see and interact with on the screen, sometimes local files, and in some designs even application data (emails, messages). That makes them an attractive “command broker” for attackers.

How to stay safe

After responsible disclosure, Google shipped fixes in early January 2026, so current versions are not vulnerable. Anything lagging that baseline is at risk and should be updated, especially if you’re using “Live in Chrome.”

Install as few extensions as possible, from vendors you can identify and contact. Prefer open‑sourced or well‑audited extensions for anything that touches sensitive workflows.

Be suspicious of sudden permission changes or unexplained new capabilities after updates.

Monitor for anomalies like cameras activating unexpectedly, unexplained screenshots, or Gemini‑related processes touching unusual file paths.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

*** This is a Security Bloggers Network syndicated blog from Malwarebytes authored by Malwarebytes. Read the original post at: https://www.malwarebytes.com/blog/news/2026/03/chrome-flaw-let-extensions-hijack-geminis-camera-mic-and-file-access


文章来源: https://securityboulevard.com/2026/03/chrome-flaw-let-extensions-hijack-geminis-camera-mic-and-file-access/
如有侵权请联系:admin#unsafe.sh