Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code

Posted on July 1, 2025July 1, 2025 By CWS

Google has issued an pressing safety replace for Chrome browser customers worldwide, addressing a essential zero-day vulnerability that’s actively being exploited by cybercriminals.

The high-severity flaw, designated CVE-2025-6554, permits attackers to execute arbitrary code on affected methods by way of a kind confusion vulnerability in Chrome’s V8 JavaScript engine.

Key Points1. CVE-2025-6554, a high-severity kind confusion in Chrome’s V8 engine, permits arbitrary code execution and is actively exploited.2. Chrome up to date to 138.0.7204.96/.97 (Home windows), 138.0.7204.92/.93 (Mac), and 138.0.7204.96 (Linux) to repair the difficulty.3. Google confirms cybercriminals are exploiting this vulnerability within the wild.4. A mitigation was utilized on June 26, 2025, however the full patch requires the newest replace.5. Replace Chrome through Settings > About Chrome instantly to safe your system.

The secure channel replace brings Chrome to model 138.0.7204.96/.97 for Home windows customers, 138.0.7204.92/.93 for Mac methods, and 138.0.7204.96 for Linux platforms. The rollout is happening regularly over the approaching days and weeks to make sure system stability throughout Google’s huge consumer base.

This emergency patch represents a swift response to a vulnerability that poses rapid dangers to customers’ digital safety.

The sort confusion flaw in V8, Chrome’s JavaScript and WebAssembly engine, creates alternatives for malicious actors to govern reminiscence allocation and doubtlessly acquire unauthorized entry to system assets.

The vulnerability was found and reported by Clément Lecigne, a safety researcher from Google’s elite Risk Evaluation Group, on June 25, 2025. This inner discovery highlights the continued safety monitoring efforts inside Google’s infrastructure.

Recognizing the severity and lively exploitation of the flaw, Google applied a direct mitigation measure on June 26, 2025, by way of a configuration change pushed to all secure channel customers throughout all platforms.

Nonetheless, this non permanent mitigation serves solely as a stopgap measure. The excellent repair requires customers to replace their browsers to the newest model to make sure full safety towards potential assaults.

Energetic Exploitation Confirmed

Google’s safety workforce has confirmed that exploits concentrating on CVE-2025-6554 are circulating within the wild, making this replace significantly pressing.

The corporate’s acknowledgment of lively exploitation signifies that cybercriminals have already weaponized this vulnerability, doubtlessly concentrating on unsuspecting customers by way of malicious web sites or compromised net functions.

Sort confusion vulnerabilities are significantly harmful as a result of they will result in reminiscence corruption, permitting attackers to execute arbitrary code with the identical privileges because the browser course of. This might doubtlessly result in system compromise, information theft, or the set up of malware.

Chrome customers ought to instantly verify their browser model by navigating to Settings > About Chrome, which can routinely set off an replace verify. The browser will obtain and set up the safety patch routinely, requiring solely a browser restart to finish the method.

Organizations utilizing Chrome in enterprise environments ought to prioritize this replace throughout their networks. The mix of confirmed lively exploitation and the high-severity ranking makes this patch deployment essential for sustaining organizational cybersecurity posture.

Google continues to leverage superior safety applied sciences, together with AddressSanitizer, MemorySanitizer, and libFuzzer, to detect and stop comparable vulnerabilities from reaching manufacturing releases.

Examine dwell malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:0Day, Arbitrary, Chrome, Code, Execute, Exploited, Vulnerability, Wild

Post navigation

Previous Post: How to Harden Your IoT Network
Next Post: Microsoft Removes Password Management from Authenticator App Starting August 2025

Related Posts

AccuKnox Awarded Patent for Runtime Security of Kernel Events Cyber Security News
AWS US-EAST-1 Region Experiences Delays in EC2 Instance Deployments Cyber Security News
Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials Cyber Security News
46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks Cyber Security News
New Phising Attack Targeting Travellers from Hotel’s Compromised Booking.com Account Cyber Security News
Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark