Categories: Cyber Security News

Google Warns of Chrome 0-Day Vulnerability Actively Exploited in the wild

Google has released an urgent security update for the Chrome browser to address a high-severity zero-day vulnerability that is currently being exploited in the wild.

This emergency patch is part of the latest Stable channel update, bringing the version to 143.0.7499.109/.110 for Windows and Mac, and 143.0.7499.109 for Linux users.

The tech giant confirmed in its advisory that it “is aware that an exploit for 466192044 exists in the wild,” signaling that threat actors are actively leveraging this flaw to compromise unpatched systems.

Consequently, the update will roll out over the coming days, but administrators and users are urged to update immediately to mitigate the risk of targeted attacks.

Chrome 0-Day Vulnerability

The critical vulnerability, tracked internally as Issue 466192044, has been rated High severity. Unlike typical disclosures, Google has kept specific technical details about the bug, such as the affected component or the attack vector, under strict restrictions. The advisory currently lists the issue status as “Under coordination.”

This restricted disclosure policy is standard practice for zero-day events. By withholding specific information until a majority of the user base has applied the fix, Google aims to prevent other malicious actors from reverse-engineering the patch and developing their own exploits.

The company stated that access to bug details would remain restricted if the bug exists in a third-party library that other projects depend on but haven’t yet fixed.

In addition to the zero-day patch, this update resolves two other security flaws, both rated as Medium severity. These issues were identified by external security researchers who worked with Google during the development cycle.

The first, assigned CVE-2025-14372, is a “Use-after-free” vulnerability located in the Chrome Password Manager. This type of flaw can often lead to memory corruption or arbitrary code execution.

The second issue, CVE-2025-14373, involves an “Inappropriate implementation” within the Chrome Toolbar. Both researchers received a $2,000 bounty for their reports.

Vulnerability Details Table

Issue ID / CVE Severity Component Description
466192044 High Undisclosed Zero-Day: Under coordination (Exploit detected in the wild)
CVE-2025-14372 Medium Password Manager Use after free vulnerability
CVE-2025-14373 Medium Toolbar Inappropriate implementation

To apply the update manually, users should navigate to the Chrome menu, select Help, and click on About Google Chrome. The browser will check for available updates and require a relaunch to complete installation.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Google Warns of Chrome 0-Day Vulnerability Actively Exploited in the wild appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Carmel Caretaker Fraud

CARMEL, Ind. (WOWO) — A caretaker from Indianapolis is accused of stealing nearly $30,000 from…

2 minutes ago

Trump administration investigation of Fed Chair Jerome Powell scrapped

U.S. Sen. Thom Tillis, R-N.C., in an elevator at the U.S. Capitol on June 30,…

7 minutes ago

Memphis lawmaker G.A. Hardaway dies after short illness

Rep. G.A. Hardaway, a longtime advocate for Memphis in the legislature, died early Friday. (Photo:…

7 minutes ago

Merrimack Valley hires interim high school principal

Merrimack Valley has moved quickly to hire an interim high school principal for the next…

16 minutes ago

NH lawmakers doubt federal cannabis policy shift will sway Ayotte, but hope for future change

The Trump administration’s reclassification of medical marijuana as a less dangerous drug may signal a…

16 minutes ago

Concord man dead in wooded area by Cumberland Farms after reported overdose

A Concord man was found dead in a wooded area by North Main Street last…

17 minutes ago

This website uses cookies.