Query Details
// Global Admin Entra Cookie with Chrome Zero-Day // CVE-2025-4664 Chrome flaw with public exploit // https://www.bleepingcomputer.com/news/security/cisa-tags-recently-patched-chrome-bug-as-actively-exploited-zero-day/ // https://www.bleepingcomputer.com/news/security/google-fixes-high-severity-chrome-flaw-with-public-exploit/ let CriticalIdentities = ExposureGraphNodes | where set_has_element(Categories, "identity") | where isnotnull(NodeProperties.rawData.criticalityLevel) and NodeProperties.rawData.criticalityLevel.criticalityLevel < 4 | where NodeProperties has "Global Administrator" // Remove this line to include all Critical Identities | distinct NodeName; let VulnerableEndPointwithBCookie = ExposureGraphEdges | where EdgeLabel == @"has credentials of" | where EdgeProperties has "BrowserCookies" | where TargetNodeName has_any (CriticalIdentities) // SourceNodeName = Devices that contains GA browser cookie | distinct SourceNodeName; DeviceProcessEvents | where Timestamp > ago(30d) | where ProcessVersionInfoProductName == "Google Chrome" | where ProcessVersionInfoProductVersion != "136.0.7103.114" and ProcessVersionInfoProductVersion != "136.0.7103.113" | summarize arg_max(Timestamp, *) by DeviceId | where DeviceName has_any(VulnerableEndPointwithBCookie)
This query is designed to identify devices that might be at risk due to a specific security vulnerability in Google Chrome. Here's a breakdown of what it does:
Identify Critical Identities:
Find Vulnerable Endpoints:
Check for Chrome Vulnerability:
Match Devices with Vulnerable Endpoints:
In summary, the query is used to detect devices that have potentially vulnerable versions of Chrome and are associated with critical identities, specifically those with Global Administrator privileges, which could be exploited due to a known security flaw.

Steven Lim
Released: May 20, 2025
Tables
Keywords
Operators