Google has launched an emergency safety replace for Chrome to handle a important use-after-free vulnerability (CVE-2025-9478) within the ANGLE graphics library that might enable attackers to execute arbitrary code on compromised methods.
The vulnerability impacts Chrome variations previous to 139.0.7258.154/.155 throughout Home windows, Mac, and Linux platforms.
The safety flaw was found by Google’s Huge Sleep AI-powered vulnerability analysis workforce on August 11, 2025, and has been assigned the best CVSS severity ranking.
Key Takeaways1. Chrome 139.0.7258.154/.155 patches important ANGLE UAF.2. Impacts GPU rendering on Home windows, Mac & Linux.3. Replace now; use EDR, isolation & CSP to dam exploits.
Chrome’s Steady Channel Replace, launched on August 26, 2025, addresses this important reminiscence corruption problem by means of computerized updates rolling out globally.
Essential Chrome ANGLE Vulnerability
The vulnerability resides inside Chrome’s ANGLE (Nearly Native Graphics Layer Engine) library, which interprets OpenGL ES API calls to hardware-specific graphics APIs, together with Direct3D, Vulkan, and native OpenGL.
Use-after-free vulnerabilities happen when a program continues to make use of a reminiscence pointer after the reminiscence has been deallocated, creating alternatives for heap manipulation and reminiscence corruption assaults.
On this particular case, the flaw in ANGLE’s reminiscence administration routines could possibly be exploited by means of maliciously crafted net content material that triggers improper reminiscence deallocation sequences.
Profitable exploitation would enable attackers to attain arbitrary code execution with the privileges of the Chrome renderer course of, probably resulting in sandbox escape and full system compromise.
The vulnerability is especially regarding as a consequence of ANGLE’s widespread utilization throughout net functions that make the most of WebGL rendering, HTML5 Canvas operations, and GPU-accelerated graphics processing.
Attackers might leverage drive-by obtain assaults, malicious commercials, or compromised web sites to ship exploit payloads focusing on this reminiscence corruption flaw.
Threat FactorsDetailsAffected ProductsChrome Desktop (≤ 139.0.7258.153) on Home windows, Mac, LinuxImpactArbitrary code executionExploit PrerequisitesUser opens malicious net content material with GPU accelerationCVSS 3.1 Score9.8 (Essential)
Mitigations
Organizations ought to prioritize the speedy deployment of Chrome model 139.0.7258.154 or later to mitigate exploitation dangers.
The replace consists of complete patches for the ANGLE library’s reminiscence administration capabilities and enhanced heap safety mechanisms to stop related use-after-free circumstances.
Safety groups ought to implement software allowlisting, community segmentation, and endpoint detection and response (EDR) options to detect potential exploitation makes an attempt.
Moreover, organizations ought to contemplate deploying Content material Safety Coverage (CSP) headers and browser isolation applied sciences to restrict the assault floor for web-based exploits focusing on this vulnerability class.
Given the important nature of this flaw and its potential for zero-day exploitation, safety professionals ought to monitor for uncommon community site visitors patterns, surprising course of spawning, and anomalous reminiscence allocation behaviors which will point out lively exploitation makes an attempt in opposition to unpatched Chrome installations.
Discover this Story Attention-grabbing! Comply with us on LinkedIn and X to Get Extra Instantaneous Updates.