Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

Roman military fort discovered in Scotland, far north of Hadrian’s Wall

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google releases CVE-2025-6558 crucial chrome update to wild and active exploits
Identity

Google releases CVE-2025-6558 crucial chrome update to wild and active exploits

userBy userJuly 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 16, 2025Ravi LakshmananBrowser Security / Zero Day

On Tuesday, Google rolled out fixes for six security issues in the Chrome web browser.

The high-strength vulnerability in question is CVE-2025-6558 (CVSS score: 8.8). This is described as an incorrect verification of browser angles and untrusted input of GPU components.

“Insufficient validation of angles and GPU untrusted input in Google Chrome prior to 138.0.0.7204.157 allowed remote attackers to potentially perform sandbox escapes via created HTML pages,” according to a flaw description in NIST’s National Ulnerability Database (NVD).

Abbreviation for “almost native graphics layer engine” and acts as a translation layer between Chrome’s rendering engine and device-specific graphics drivers. The vulnerability here allows attackers to escape the Chrome sandbox by abusing low-level GPU operations that usually keep the browser quarantining, making it an unusual but powerful path to deeper system access.

Cybersecurity

Clément Lecigne and Vlad Stolyarov of Google’s Threat Analysis Group (TAG) are acknowledged that they discovered and reported a zero-day vulnerability on June 23, 2025.

The exact nature of the attack that weaponizes the flaws has not been revealed, but Google has admitted that “the abuse of CVE-2025-6558 exists in the wild.” However, the discoveries by the tag imply the possibility of nation-state involvement.

The development took place about two weeks after Google dealt with another actively and actively utilised Chrome Zero-Day (CVE-2025-6554, CVSS score: 8.1), and was also reported by Lecigne on June 25, 2025.

Google resolved a total of five zero-day vulnerabilities in Chrome. These have been demonstrated as active exposure or demonstrated (POC) since the beginning of the year. These include CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, and CVE-2025-6554.

For most users, such sandbox escape means that even if you visit a malicious site, you can still escape the security bubble in your browser and interact with your system. This is especially important for target attacks where simply opening a web page can trigger a silent compromise. No downloads or clicks are required.

To protect against potential threats, we recommend updating to Chrome browser 138.0.7204.157/.158 for Windows and Apple MacOS and version 138.0.7204.157/.158 to Linux. To ensure that the latest updates are installed, users can use Google Chrome >[ヘルプ]>[ヘルプ]You can navigate to and select Renewal.

Cybersecurity

It is also recommended that users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi also apply the fix when it becomes available.

Such issues often lie in a broader category, such as GPU sandbox escape, shader-related bugs, or WebGL vulnerabilities. They don’t always grab headlines, but they tend to resurface with chained exploits or targeted attacks. If you are following Chrome Security Updates, it is worth watching for terms like graphic driver flaws, privileged boundary bypass, memory corruption in rendering paths, and more.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle AI “Big Sleep” stops exploitation of critical SQLite vulnerabilities before hacker law
Next Article Is Europe ready to lead the fusion energy race?
user
  • Website

Related Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

March 14, 2026

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

Roman military fort discovered in Scotland, far north of Hadrian’s Wall

‘Wasn’t built right from the start’ — Musk’s xAI starts all over again

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.