Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Taiwanese web server violated by UAT-7237 using customized open source hacking tools

Ultrhuman gets Vio HealthTech and starts expanding cycles and ovulation tracking

Louisiana Attorney General sues Roblox

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google Patch is a critical zero-day flaw in Chrome’s V8 engine after active exploitation
Identity

Google Patch is a critical zero-day flaw in Chrome’s V8 engine after active exploitation

userBy userJuly 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 1, 2025Ravi LakshmananVulnerability/Browser Security

Google has released a security update to address a vulnerability in the Chrome browser that has exploits in Wild.

The zero-day vulnerability tracked as CVE-2025-6554 (CVSS score: N/A) is described as a confusing flaw in the type of V8 JavaScript and WebAssembly engine.

“Confusion in the V8 type of Google Chrome prior to 138.0.0.7204.96 meant that Nist’s National Ulnerability Database (NVD) bug description “a remote attacker could perform arbitrary reads/writes via the created HTML page.”

Type confusion vulnerabilities can have serious consequences as they can be exploited to trigger unexpected software behavior, resulting in arbitrary code and program crashes.

Such zero-day bugs are particularly dangerous as attackers often start using them before the fix becomes available. In real attacks, these flaws allow hackers to install spyware, launch drive-by downloads, and quietly execute harmful code.

Clément Lecigne, Google’s Threat Analysis Group (TAG), is acknowledged to have discovered and reported the flaws on June 25, 2025, indicating that it may have been weaponized in a highly targeted attack.

The involvement of Google’s threat analysis group indicates that exploits may be related to targeted attacks in many cases. Tags typically investigate serious threats, such as phishing campaigns, zero-click exploits, or attempts to bypass the browser’s sandbox.

Tech Giant also noted that this issue was alleviated the next day by configuration changes pushed into stable channels across all platforms. For everyday users, that means that the threat may not be spreading yet, but applying a patch is still urgent, especially if you are in the role of processing sensitive or valuable data.

Cybersecurity

Google has not released any additional details about the vulnerability and the vulnerabilities that may have exploited it, but has admitted that “the exploitation of CVE-2025-6554 exists in the wild.”

CVE-2025-6554 is a 4th day zero-day vulnerability in Chrome, as Google deals with from the beginning of the year after CVE-2025-2783, CVE-2025-4664, and CVE-2025-5419. However, we note that it is not clear whether CVE-2025-4664 is abused in a malicious context.

To protect against potential threats, we recommend updating to Chrome browser 138.0.7204.96/.97 for Windows, 138.0.7204.92/.93 for MACOS, and 138.0.7204.92/.93 for Linux.

If you’re not sure if your browser is up to date, go to Settings > Help > About Google Chrome. The latest updates should be automatically triggered. For businesses and IT teams managing multiple endpoints, enabling automated patch management and compliance with the monitoring browser version is important.

It is also recommended that users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi also apply the fix when it becomes available.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUKAEA and EMCCA sign a 20-year Fusion Energy Training Partnership
Next Article The discussion of vacation rentals in Maui is ugly
user
  • Website

Related Posts

Taiwanese web server violated by UAT-7237 using customized open source hacking tools

August 15, 2025

Garantex and Grinex sanctions exceeding $100 million for illegal ransom-related crypto transactions

August 15, 2025

Privacy in the age of Agent AI

August 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Taiwanese web server violated by UAT-7237 using customized open source hacking tools

Ultrhuman gets Vio HealthTech and starts expanding cycles and ovulation tracking

Louisiana Attorney General sues Roblox

Negotiations for the Global Plastics Treaty collapse – what happens next?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Google’s Genie 3: The Dawn of General AI?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.