Skip to content

Chrome Zero-Day Vulnerability Fixed Urgently by Google in 2025

Chrome updates with fix for critical type confusion zero-day vulnerability, marking the fourth such repair in 2025 by Google

Chrome faces fourth zero-day vulnerability this year, prompting Google to release an emergency...
Chrome faces fourth zero-day vulnerability this year, prompting Google to release an emergency security update

Chrome Zero-Day Vulnerability Fixed Urgently by Google in 2025

In a recent development, Google has addressed a significant security vulnerability in its Chrome browser. The flaw, identified as CVE-2025-6554, is a Type Confusion Vulnerability in Chrome's V8 JavaScript and WebAssembly engine.

This vulnerability, if exploited, could allow attackers to execute arbitrary code or crash programs. It is worth noting that Type Confusion errors can have high-impact security implications.

The Google Threat Analysis Group (TAG) reported the bug on June 25, and Google deployed a configuration change on June 26 to mitigate the risk for users on Windows, macOS, and Linux. However, the company has not disclosed technical details or confirmed who was targeted, citing user protection and ongoing patching as reasons for withholding information.

Previous zero-days in Chrome have included sandbox escapes and out-of-bounds memory weaknesses, some of which have been linked to espionage campaigns targeting Russian institutions. This latest vulnerability allows attackers to manipulate software to access memory out of bounds when a program incorrectly assumes the 'nitro type' of an object. It also enables arbitrary read and write operations via specially crafted web pages.

The flaw affects Chrome versions before 138.0.7204.96. Google has already released a patch for the issue, and users are advised to update their browsers to the latest version. Manual updates for Chrome can be triggered by visiting Settings > Help > About Google Chrome.

It's important to note that this issue is not exclusive to Chrome. Other Chromium-based browsers, such as Microsoft Edge, Brave, Opera, and Vivaldi, are also potentially impacted and should be updated once fixes are released.

This is the fourth 'monkeytype' vulnerability addressed by Google this year. Organizations managing multiple endpoints should ensure patch compliance and activate automated browser updates to minimise the risk of exploitation.

In light of this development, it's a reminder for users to keep their browsers updated to ensure a secure browsing experience. As always, be cautious when visiting unfamiliar or suspicious websites, and keep an eye out for updates from your browser providers.

Read also:

Latest