Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Chrome 0-Day Vulnerability Actively Exploited in the Wild

Posted on September 18, 2025September 18, 2025 By CWS

Google has launched an emergency safety replace for its Chrome internet browser to handle a high-severity zero-day vulnerability that’s being actively exploited within the wild.

Customers are strongly urged to replace their browsers instantly to guard towards potential assaults. The vulnerability, tracked as CVE-2025-10585, is the newest in a sequence of zero-days found and patched in Chrome this yr.

The brand new secure channel model has been up to date to 140.0.7339.185/.186 for Home windows and Mac, and 140.0.7339.185 for Linux.

Google has said that the replace can be rolling out to all customers over the approaching days and weeks. To mitigate the rapid menace, customers ought to manually set off the replace course of to make sure they’re protected.

Zero-Day Vulnerability Exploited

The actively exploited vulnerability, CVE-2025-10585, is a Sort Confusion flaw within the V8 JavaScript and WebAssembly engine.

Sort confusion bugs happen when a program allocates a useful resource or object utilizing one sort however later accesses it with a distinct, incompatible sort. This may result in logical errors, reminiscence corruption, and in the end, arbitrary code execution.

A profitable exploit may enable a distant attacker to flee the browser’s safety sandbox by tricking a consumer into visiting a specifically crafted, malicious webpage.

The vulnerability was reported on September 16, 2025, by Google’s personal Risk Evaluation Group (TAG), which usually finds zero-days being utilized in focused assaults by refined menace actors.

Different Vulnerabilities

Along with the zero-day, this safety replace addresses three different high-severity vulnerabilities found by exterior safety researchers.

The primary, CVE-2025-10500, is a use-after-free vulnerability in Daybreak, a graphics abstraction layer. The second, CVE-2025-10501, can also be a use-after-free flaw, discovered within the WebRTC element, which allows real-time communication.

The third vulnerability, CVE-2025-10502, is a heap buffer overflow in ANGLE, a graphics engine translation layer. Use-after-free and heap overflow vulnerabilities may result in reminiscence corruption and arbitrary code execution.

Google has awarded bug bounty funds of $15,000 and $10,000 for the invention of two of those flaws.

Given the affirmation of lively exploitation, the chance to unpatched methods is important. All Google Chrome customers on Home windows, macOS, and Linux are suggested to replace their browsers to the newest model immediately.

To test your Chrome model and apply the replace, navigate to the “Assist” menu and choose “About Google Chrome.” The browser will mechanically test for and obtain the newest replace, after which a restart can be required to use the patch.

Google is presently proscribing entry to the bug particulars and hyperlinks associated to CVE-2025-10585 to stop additional abuse whereas the patch is being rolled out to nearly all of its consumer base.

In 2025, Google patched a number of actively exploited zero-day vulnerabilities in its Chrome internet browser, requiring customers to replace their software program promptly to remain protected.

Chrome zero-day vulnerabilities which were publicly disclosed and patched in 2025:

CVE IDVulnerability TypeDescriptionExploited within the WildCVE-2025-10585Type ConfusionA sort confusion flaw within the V8 JavaScript engine that may very well be exploited by way of a malicious webpage.YesCVE-2025-6558Improper Enter ValidationInsufficient validation of untrusted enter within the ANGLE and GPU parts, permitting a distant attacker to carry out a sandbox escape.YesCVE-2025-6554Type ConfusionA sort confusion vulnerability within the V8 JavaScript and WebAssembly engine, which may enable an attacker to carry out arbitrary learn/write operations.YesCVE-2025-5419Out-of-Bounds AccessAn out-of-bounds learn and write vulnerability within the V8 engine that would enable reminiscence corruption by visiting a crafted webpage.YesCVE-2025-2783Sandbox BypassA crucial vulnerability that enables for bypassing Chrome’s sandbox safety.YesCVE-2025-4664Insufficient coverage enforcementThis vulnerability was addressed by Google as a zero-day, however it’s unclear if it was actively exploited in malicious assaults.Sure

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:0Day, Actively, Chrome, Exploited, Google, Vulnerability, Wild

Post navigation

Previous Post: MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints
Next Post: Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2025

Related Posts

New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands Cyber Security News
Microsoft To Depreciate VBScript In Windows Warns Developers To Adapt Their Projects Cyber Security News
Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access Cyber Security News
The Future of Cybersecurity – Trends Shaping the Industry Cyber Security News
South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims Cyber Security News
APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government Entities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top 10 Best Next‑Generation Firewall (NGFW) Providers in 2025
  • Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2025
  • Google Chrome 0-Day Vulnerability Actively Exploited in the Wild
  • MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints
  • BeaverTail Variant via Malicious Repositories Targeting Retail Sector Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top 10 Best Next‑Generation Firewall (NGFW) Providers in 2025
  • Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2025
  • Google Chrome 0-Day Vulnerability Actively Exploited in the Wild
  • MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints
  • BeaverTail Variant via Malicious Repositories Targeting Retail Sector Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News