Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Warns of Chrome 0-Day Vulnerability Actively Exploited in the wild

Posted on December 11, 2025December 11, 2025 By CWS

Google has launched an pressing safety replace for the Chrome browser to handle a high-severity zero-day vulnerability that’s at present being exploited within the wild.

This emergency patch is a part of the most recent Steady channel replace, bringing the model to 143.0.7499.109/.110 for Home windows and Mac, and 143.0.7499.109 for Linux customers.

The tech big confirmed in its advisory that it “is conscious that an exploit for 466192044 exists within the wild,” signaling that menace actors are actively leveraging this flaw to compromise unpatched programs.

Consequently, the replace will roll out over the approaching days, however directors and customers are urged to replace instantly to mitigate the chance of focused assaults.

Chrome 0-Day Vulnerability

The important vulnerability, tracked internally as Challenge 466192044, has been rated Excessive severity. Not like typical disclosures, Google has saved particular technical particulars concerning the bug, such because the affected element or the assault vector, below strict restrictions. The advisory at present lists the problem standing as “Below coordination.”

This restricted disclosure coverage is commonplace apply for zero-day occasions. By withholding particular info till a majority of the person base has utilized the repair, Google goals to forestall different malicious actors from reverse-engineering the patch and growing their very own exploits.

The corporate acknowledged that entry to bug particulars would stay restricted if the bug exists in a third-party library that different tasks rely upon however haven’t but fastened.

Along with the zero-day patch, this replace resolves two different safety flaws, each rated as Medium severity. These points have been recognized by exterior safety researchers who labored with Google throughout the improvement cycle.

The primary, assigned CVE-2025-14372, is a “Use-after-free” vulnerability situated within the Chrome Password Supervisor. This kind of flaw can usually result in reminiscence corruption or arbitrary code execution.

The second concern, CVE-2025-14373, entails an “Inappropriate implementation” inside the Chrome Toolbar. Each researchers obtained a $2,000 bounty for his or her studies.

Vulnerability Particulars Desk

Challenge ID / CVESeverityComponentDescription466192044HighUndisclosedZero-Day: Below coordination (Exploit detected within the wild)CVE-2025-14372MediumPassword ManagerUse after free vulnerabilityCVE-2025-14373MediumToolbarInappropriate implementation

To use the replace manually, customers ought to navigate to the Chrome menu, choose Assist, and click on on About Google Chrome. The browser will test for accessible updates and require a relaunch to finish set up.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Actively, Chrome, Exploited, Google, Vulnerability, Warns, Wild

Post navigation

Previous Post: React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
Next Post: Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security

Related Posts

Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware Cyber Security News
“CitrixBleed 2” Vulnerability PoC Released Cyber Security News
Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data Cyber Security News
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News
Cloud Misconfigurations The Silent Threat to Data Security Cyber Security News
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
  • Policy, Isolation, and Data Controls That Actually Work
  • Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark