Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Warns of Chrome 0-Day Vulnerability Actively Exploited in the wild

Posted on December 11, 2025December 11, 2025 By CWS

Google has launched an pressing safety replace for the Chrome browser to handle a high-severity zero-day vulnerability that’s at present being exploited within the wild.

This emergency patch is a part of the most recent Steady channel replace, bringing the model to 143.0.7499.109/.110 for Home windows and Mac, and 143.0.7499.109 for Linux customers.

The tech big confirmed in its advisory that it “is conscious that an exploit for 466192044 exists within the wild,” signaling that menace actors are actively leveraging this flaw to compromise unpatched programs.

Consequently, the replace will roll out over the approaching days, however directors and customers are urged to replace instantly to mitigate the chance of focused assaults.

Chrome 0-Day Vulnerability

The important vulnerability, tracked internally as Challenge 466192044, has been rated Excessive severity. Not like typical disclosures, Google has saved particular technical particulars concerning the bug, such because the affected element or the assault vector, below strict restrictions. The advisory at present lists the problem standing as “Below coordination.”

This restricted disclosure coverage is commonplace apply for zero-day occasions. By withholding particular info till a majority of the person base has utilized the repair, Google goals to forestall different malicious actors from reverse-engineering the patch and growing their very own exploits.

The corporate acknowledged that entry to bug particulars would stay restricted if the bug exists in a third-party library that different tasks rely upon however haven’t but fastened.

Along with the zero-day patch, this replace resolves two different safety flaws, each rated as Medium severity. These points have been recognized by exterior safety researchers who labored with Google throughout the improvement cycle.

The primary, assigned CVE-2025-14372, is a “Use-after-free” vulnerability situated within the Chrome Password Supervisor. This kind of flaw can usually result in reminiscence corruption or arbitrary code execution.

The second concern, CVE-2025-14373, entails an “Inappropriate implementation” inside the Chrome Toolbar. Each researchers obtained a $2,000 bounty for his or her studies.

Vulnerability Particulars Desk

Challenge ID / CVESeverityComponentDescription466192044HighUndisclosedZero-Day: Below coordination (Exploit detected within the wild)CVE-2025-14372MediumPassword ManagerUse after free vulnerabilityCVE-2025-14373MediumToolbarInappropriate implementation

To use the replace manually, customers ought to navigate to the Chrome menu, choose Assist, and click on on About Google Chrome. The browser will test for accessible updates and require a relaunch to finish set up.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Actively, Chrome, Exploited, Google, Vulnerability, Warns, Wild

Post navigation

Previous Post: React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
Next Post: Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security

Related Posts

Threat Actors with Fake Job Lures Attacking Job Seekers to Deploy Advanced Malware Cyber Security News
Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload Cyber Security News
Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware Cyber Security News
Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach Cyber Security News
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention Cyber Security News
PoC Exploit Released for Critical Lua Engine Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems
  • Recent GeoServer Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems
  • Recent GeoServer Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark