HomeVulnerabilityGoogle Patches Vital Zero-Day Flaw in Chrome's V8 Engine After Energetic Exploitation

Google Patches Vital Zero-Day Flaw in Chrome’s V8 Engine After Energetic Exploitation

Google has launched security updates to handle a vulnerability in its Chrome browser for which an exploit exists within the wild.

The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS rating: N/A), has been described as a sort complicated flaw within the V8 JavaScript and WebAssembly engine.

“Kind confusion in V8 in Google Chrome previous to 138.0.7204.96 allowed a distant attacker to carry out arbitrary learn/write through a crafted HTML web page,” in line with an outline of the bug on the NIST’s Nationwide Vulnerability Database (NVD).

Kind confusion vulnerabilities can have extreme penalties as they are often exploited to set off sudden software program conduct, ensuing within the execution of arbitrary code and program crashes.

Zero-day bugs like this are particularly dangerous as a result of attackers typically begin utilizing them earlier than a repair is accessible. In real-world assaults, these flaws can let hackers set up spy ware, launch drive-by downloads, or quietly run dangerous code — typically simply by getting somebody to open a malicious web site.

See also  ServiceNow is in talks to purchase identification security agency Veza for over $1 billion: report

Clément Lecigne of Google’s Menace Evaluation Group (TAG) has been credited with discovering and reporting the flaw on June 25, 2025, signaling that it could have been weaponized in extremely focused assaults — probably involving nation-state actors or surveillance operations. TAG sometimes detects and investigates critical threats like government-backed assaults.

The tech large additionally famous that the problem was mitigated the following day by the use of a configuration change that was pushed out to the Steady channel throughout all platforms. For on a regular basis customers, meaning the risk might not be widespread but, but it surely’s nonetheless pressing to patch — particularly in the event you’re in roles dealing with delicate or high-value knowledge.

Cybersecurity

Google has not launched any extra particulars concerning the vulnerability and who might have exploited it, however acknowledged that “an exploit for CVE-2025-6554 exists within the wild.”

CVE-2025-6554 is the fourth zero-day vulnerability in Chrome to be addressed by Google for the reason that begin of the yr after CVE-2025-2783, CVE-2025-4664, and CVE-2025-5419. Nonetheless, it bears noting that there is no such thing as a readability on whether or not CVE-2025-4664 has been abused in a malicious context.

See also  CISA warns of actively exploited Linux privilege elevation flaw

To safeguard in opposition to potential threats, it is suggested to replace their Chrome browser to variations 138.0.7204.96/.97 for Home windows, 138.0.7204.92/.93 for macOS, and 138.0.7204.96 for Linux.

If you happen to’re uncertain whether or not your browser is updated, go to Settings > Assist > About Google Chrome — it ought to set off the newest replace robotically. For companies and IT groups managing a number of endpoints, enabling automated patch administration and monitoring browser model compliance is crucial.

Customers of different Chromium-based browsers corresponding to Microsoft Edge, Courageous, Opera, and Vivaldi are additionally suggested to use the fixes as and after they change into accessible.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular