Query Details
// Critical identities with zero-day Chrome vulnerability // CVE-2025-4664 Chrome flaw with public exploit // https://www.bleepingcomputer.com/news/security/cisa-tags-recently-patched-chrome-bug-as-actively-exploited-zero-day/ // https://www.bleepingcomputer.com/news/security/google-fixes-high-severity-chrome-flaw-with-public-exploit/ let CriticalIdentities = ExposureGraphNodes | where set_has_element(Categories, "identity") | where isnotnull(NodeProperties.rawData.criticalityLevel) and NodeProperties.rawData.criticalityLevel.criticalityLevel < 4 | distinct NodeName; let AdminDevices = ExposureGraphEdges | where EdgeLabel == @"can authenticate to" | join ExposureGraphNodes on $left.TargetNodeId==$right.NodeId | extend DName = tostring(NodeProperties.rawData.deviceName) | extend isLocalAdmin = EdgeProperties.rawData.userRightsOnDevice.isLocalAdmin | where SourceNodeName has_any (CriticalIdentities) | distinct DName; DeviceProcessEvents | where Timestamp > ago(30d) | where ProcessVersionInfoProductName == "Google Chrome" | where ProcessVersionInfoProductVersion != "136.0.7103.114" | summarize arg_max(Timestamp, *) by DeviceId | where DeviceName has_any(AdminDevices)
This KQL query is designed to identify critical identities that might be at risk due to a specific zero-day vulnerability in Google Chrome (CVE-2025-4664). Here's a simplified breakdown of what the query does:
Identify Critical Identities:
Find Devices Administered by Critical Identities:
Detect Vulnerable Chrome Installations:
Output:
In essence, the query is identifying devices that are potentially vulnerable to a known Chrome exploit and are administered by critical identities, highlighting a potential security risk.

Steven Lim
Released: May 17, 2025
Tables
Keywords
Operators