Chrome flaw let extensions hijack Gemini’s camera, mic, and file access
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。首先,我得通读整篇文章,抓住主要信息。 文章讲的是Chrome里的Gemini面板有一个高危漏洞,编号是CVE-2026-0628。这个漏洞让低权限的扩展程序可以注入代码到Gemini面板里,继承它的强大功能,比如访问本地文件、截图、控制摄像头和麦克风。这个漏洞后来在1月份被修复了。 然后,作者提到AI浏览器打破了传统的隔离边界,使得扩展滥用、提示注入和信任UI钓鱼攻击变得更加危险。Gemini面板作为一个特权组件,能够执行很多高权限操作,而低权限扩展通过这个漏洞可以接管这些功能。 接下来,文章还建议用户如何保护自己:及时更新Chrome到最新版本,尽量少安装扩展程序,并且选择可信的来源。同时要留意异常行为,比如摄像头麦克风突然启动或者Gemini进程访问不寻常的文件路径。 所以总结起来,文章主要讲的是Chrome Gemini面板的一个高危漏洞及其带来的安全风险,并给出了防护建议。我需要把这些信息浓缩到100字以内。 可能的结构是:Chrome Gemini面板存在高危漏洞(CVE编号),允许低权限扩展注入代码并获取高权限功能(如文件访问、截图、摄像头控制)。该漏洞已修复(1月更新),但AI浏览器的安全问题凸显。建议用户更新浏览器、谨慎安装扩展,并留意异常行为以防范风险。 这样应该能涵盖主要内容,并且符合用户的要求。 </think> Chrome的Gemini面板存在高危漏洞(CVE-2026-0628),允许低权限扩展注入代码并获取高权限功能(如文件访问、截图、摄像头控制)。该漏洞已修复(1月更新),但AI浏览器的安全问题凸显。建议用户更新浏览器、谨慎安装扩展,并留意异常行为以防范风险。 2026-3-3 12:10:19 Author: www.malwarebytes.com(查看原文) 阅读量:10 收藏

Chrome’s Gemini “Live in Chrome” panel (Gemini’s embedded, agent-style assistant mode within Chrome) had a high‑severity vulnerability tracked as CVE‑2026‑0628. The flaw let a low‑privilege extension inject code into the Gemini side panel and inherit its powerful capabilities, including local file access, screenshots, and camera/microphone control.

The vulnerability was patched in a January update. But the deeper story is that AI or agentic browsers are stepping outside long‑standing isolation boundaries, so extension abuse, prompt injection, and trusted‑UI phishing all become much more dangerous.

Chrome’s Gemini “Live in Chrome” panel runs the Gemini web app in a special, privileged side panel that can see what’s on screen and perform actions like reading local files, taking screenshots, and using the camera and microphone to automate tasks.

Researchers found that an extension using the declarativeNetRequest API (Application Programming Interface) could tamper with traffic to gemini.google.com/app when it loaded inside this side panel, not just in a normal tab.

As a result, a basic‑permission extension could inject JavaScript into a high‑privilege browser component and start camera and microphone without new consent prompts, enumerate local files and directories, take screenshots of any HTTPS site, and even turn the Gemini panel itself into a phishing UI.

Normally, extensions cannot control other extensions or core browser components, but due to this vulnerability, a low‑privilege extension could effectively drive a privileged AI assistant and inherit its powers.

And because the Gemini panel is a trusted part of the Chrome browser, users would not expect it to silently activate camera or microphone or scrape local files at an extension’s whim.

Therefore, it is good to be aware that agentic browsers, such as Gemini in Chrome, Copilot in Edge, Atlas, Comet, etc., embed an AI side panel that sees page content, keeps context, and can autonomously execute multi‑step actions like summarization, form‑filling, and automation.

These assistants need broad access to the web pages you’re looking at, including everything you see and interact with on the screen, sometimes local files, and in some designs even application data (emails, messages). That makes them an attractive “command broker” for attackers.

How to stay safe

After responsible disclosure, Google shipped fixes in early January 2026, so current versions are not vulnerable. Anything lagging that baseline is at risk and should be updated, especially if you’re using “Live in Chrome.”

Install as few extensions as possible, from vendors you can identify and contact. Prefer open‑sourced or well‑audited extensions for anything that touches sensitive workflows.

Be suspicious of sudden permission changes or unexplained new capabilities after updates.

Monitor for anomalies like cameras activating unexpectedly, unexplained screenshots, or Gemini‑related processes touching unusual file paths.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/03/chrome-flaw-let-extensions-hijack-geminis-camera-mic-and-file-access
如有侵权请联系:admin#unsafe.sh