Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Confusion sees India as a shortcut in competition with OpenAs

Humanity will strengthen limits on the use of Claude Code without telling it to users

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google Patch is a critical zero-day flaw in Chrome’s V8 engine after active exploitation
Identity

Google Patch is a critical zero-day flaw in Chrome’s V8 engine after active exploitation

userBy userJuly 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 1, 2025Ravi LakshmananVulnerability/Browser Security

Google has released a security update to address a vulnerability in the Chrome browser that has exploits in Wild.

The zero-day vulnerability tracked as CVE-2025-6554 (CVSS score: N/A) is described as a confusing flaw in the type of V8 JavaScript and WebAssembly engine.

“Confusion in the V8 type of Google Chrome prior to 138.0.0.7204.96 meant that Nist’s National Ulnerability Database (NVD) bug description “a remote attacker could perform arbitrary reads/writes via the created HTML page.”

Type confusion vulnerabilities can have serious consequences as they can be exploited to trigger unexpected software behavior, resulting in arbitrary code and program crashes.

Such zero-day bugs are particularly dangerous as attackers often start using them before the fix becomes available. In real attacks, these flaws allow hackers to install spyware, launch drive-by downloads, and quietly execute harmful code.

Clément Lecigne, Google’s Threat Analysis Group (TAG), is acknowledged to have discovered and reported the flaws on June 25, 2025, indicating that it may have been weaponized in a highly targeted attack.

The involvement of Google’s threat analysis group indicates that exploits may be related to targeted attacks in many cases. Tags typically investigate serious threats, such as phishing campaigns, zero-click exploits, or attempts to bypass the browser’s sandbox.

Tech Giant also noted that this issue was alleviated the next day by configuration changes pushed into stable channels across all platforms. For everyday users, that means that the threat may not be spreading yet, but applying a patch is still urgent, especially if you are in the role of processing sensitive or valuable data.

Cybersecurity

Google has not released any additional details about the vulnerability and the vulnerabilities that may have exploited it, but has admitted that “the exploitation of CVE-2025-6554 exists in the wild.”

CVE-2025-6554 is a 4th day zero-day vulnerability in Chrome, as Google deals with from the beginning of the year after CVE-2025-2783, CVE-2025-4664, and CVE-2025-5419. However, we note that it is not clear whether CVE-2025-4664 is abused in a malicious context.

To protect against potential threats, we recommend updating to Chrome browser 138.0.7204.96/.97 for Windows, 138.0.7204.92/.93 for MACOS, and 138.0.7204.92/.93 for Linux.

If you’re not sure if your browser is up to date, go to Settings > Help > About Google Chrome. The latest updates should be automatically triggered. For businesses and IT teams managing multiple endpoints, enabling automated patch management and compliance with the monitoring browser version is important.

It is also recommended that users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi also apply the fix when it becomes available.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUKAEA and EMCCA sign a 20-year Fusion Energy Training Partnership
Next Article The discussion of vacation rentals in Maui is ugly
user
  • Website

Related Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

July 17, 2025

Hackers exploit flaws in apache http server to deploy linuxsys cryptocurrency miner

July 17, 2025

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

July 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Confusion sees India as a shortcut in competition with OpenAs

Humanity will strengthen limits on the use of Claude Code without telling it to users

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Openai launches a general purpose agent with ChatGpt

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.