More work for admins as Google patches latest zero-day Chrome vulnerability

Source: More work for admins as Google patches latest zero-day Chrome vulnerability | CSO Online

Author: unknown

URL: https://www.csoonline.com/article/4092287/more-work-for-admins-as-google-patches-latest-zero-day-chrome-vulnerability.html

ONE SENTENCE SUMMARY:

Google urgently patched a high-severity zero-day flaw in Chrome’s V8 engine, raising security concerns for other Chromium browsers.

MAIN POINTS:

  1. Google addressed a zero-day flaw in Chrome’s V8 JavaScript engine, identified as CVE-2025-13223.
  2. Clément Lecigne from Google’s Threat Analysis Group discovered the vulnerability.
  3. The flaw has a CVSS score of 8.8 and was actively exploited.
  4. It is a Type Confusion flaw affecting multiple Chromium-based browsers.
  5. Google’s usual policy restricts detail release until a majority are updated.
  6. The V8 engine is crucial for Chromium browsers, posing widespread risk.
  7. Enterprises are advised to urgently patch to Chrome version 142.0.7444.175/.176.
  8. Type Confusion flaws can lead to memory corruption or code execution.
  9. A separate V8 vulnerability, CVE-2025-13224, was patched simultaneously.
  10. Chrome has faced two other V8 zero days in 2025 alone.

TAKEAWAYS:

  1. Urgent patching of Chrome for enterprises is critical due to high-severity flaws.
  2. Type Confusion vulnerabilities in V8 can lead to serious security risks.
  3. Multiple Chromium browsers are affected, increasing the scope of risk.
  4. Enterprises face pressure to patch quickly due to zero-day vulnerabilities.
  5. Shared components like V8 increase the impact radius of attacks.