[CIVN-2025-0217] Multiple vulnerabilities in Google Chrome for Desktop
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple vulnerabilities in Google Chrome for Desktop
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Google Chrome versions prior to 140.0.7339.185/.186 for Windows/Mac
Google Chrome versions prior to 140.0.7339.185 for Linux
Overview
Multiple vulnerabilities have been reported in Google Chrome, which could allow a remote attacker to execute arbitrary code, cause denial of service (DoS) condition and information disclosure on the targeted system.
Target Audience:
All end-user organizations and individuals using affected Google Chrome for Desktop.
Risk Assessment:
Potential for unauthorized access and system compromise.
Impact Assessment:
High risk of system compromise, data theft and service disruptions.
Description
Google Chrome is a popular internet browser that is used for accessing the information available on the World Wide Web. It is designed for use on desktop computers, such as those running on Windows, macOS, or Linux operating systems.
These vulnerabilities exist in Google Chrome due to Type Confusion in V8, Heap buffer overflow in ANGLE, Use after free in Dawn and WebRTC. A remote attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted web page.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, denial of service (DoS) condition and obtain sensitive information on the targeted system.
Note: This vulnerability (CVE-2025-10585) is being exploited in the wild. Users are advised to apply patches urgently.
Solution
Apply appropriate updates as mentioned by the vendor:
https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html
Vendor Information
Google
https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html
References
Google
https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html
CVE Name
CVE-2025-10500
CVE-2025-10501
CVE-2025-10502
CVE-2025-10585
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=GgWd
—–END PGP SIGNATURE—–