Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome Security Update Patches Critical Remote Code Execution Vulnerability

Chrome Security Update Patches Critical Remote Code Execution Vulnerability

Posted on September 10, 2025September 10, 2025 By CWS

Google has issued an pressing safety replace for the Chrome browser on Home windows, Mac, and Linux, addressing a crucial vulnerability that would permit attackers to execute arbitrary code remotely.

Customers are strongly suggested to replace their browsers instantly to guard in opposition to potential threats.

The Steady channel has been up to date to model 140.0.7339.127/.128 for Home windows, 140.0.7339.132/.133 for Mac, and 140.0.7339.127 for Linux.

The replace is at present rolling out and can grow to be out there to all customers over the approaching days and weeks. This patch follows the preliminary launch of Chrome 140, which additionally addressed a number of different safety points.

CVE IDSeverityDescriptionAffected ComponentBug BountyCVE-2025-10200CriticalUse-after-freeServiceworker$43,000CVE-2025-10201HighInappropriate implementationMojo$30,000

Essential Use-After-Free Vulnerability

The replace resolves two main safety flaws, with essentially the most extreme being CVE-2025-10200. This vulnerability is rated as crucial and is described as a “Use-after-free” bug within the Serviceworker element.

A use-after-free flaw happens when a program tries to make use of reminiscence after it has been deallocated, which might result in crashes, information corruption, or, within the worst case, arbitrary code execution.

An attacker may exploit this vulnerability by crafting a malicious webpage that, when visited by a person, may permit the attacker to run malicious code on the sufferer’s system.

Safety researcher Looben Yang reported this crucial flaw on August 22, 2025. In recognition of the severity of the invention, Google has awarded a bug bounty of $43,000.

Excessive-Severity Mojo Implementation Flaw

The second vulnerability patched on this launch is CVE-2025-10201, a high-severity flaw recognized as an “Inappropriate implementation in Mojo.”

Mojo is a group of runtime libraries used for inter-process communication inside Chromium, the open-source venture that powers Chrome.

Flaws on this element will be notably harmful as they will doubtlessly compromise the browser’s sandbox, a key safety function that isolates processes to forestall exploits from affecting the underlying system.

This vulnerability was reported by Sahan Fernando and an nameless researcher on August 18, 2025. The reporters have been awarded a $30,000 bounty for his or her findings.

Google is rolling out the replace regularly, however customers can manually test for and apply the replace by navigating to Settings > About Google Chrome.

The browser will mechanically scan for the most recent model and immediate the person to relaunch it to finish the replace course of.

As is normal observe, Google has restricted entry to detailed details about the bugs to forestall attackers from creating exploits earlier than a majority of customers have put in the patch. This highlights the significance of making use of safety updates as quickly as they grow to be out there.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Chrome, Code, Critical, Execution, Patches, Remote, Security, Update, Vulnerability

Post navigation

Previous Post: Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts
Next Post: Workday Confirms Data Breach – Hackers Accessed Customers Data and Case Information

Related Posts

Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers Cyber Security News
Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign Cyber Security News
CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity Cyber Security News
Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution Cyber Security News
Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control Cyber Security News
CISA Warns of Dassault Systèmes Vulnerabilities Actively Exploited in Attacks CISA Warns of Dassault Systèmes Vulnerabilities Actively Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark