Google Patches Chrome Zero-Day Under Active Attack — Update Now

Stephanie Adlam
4 Min Read
Chrome Zero-Day Exploited
Chrome Zero-Day Exploited

Google dropped an urgent Chrome update on Wednesday to fix a high-severity vulnerability that’s already being exploited in the wild. If you haven’t updated your browser yet, now would be an excellent time.

The flaw is tracked under Chromium issue ID 466192044—and that’s about all Google is sharing publicly. No CVE, no component name, no details on who’s targeted or by whom. Classic security playbook: give users time to patch before handing attackers a roadmap.

What We Know About the Vulnerability

While Google kept the details under wraps, a GitHub commit reveals that the issue lives in ANGLE—Google’s open-source Almost Native Graphics Layer Engine, which handles graphics rendering in Chrome.

The commit message hints at a buffer overflow vulnerability in ANGLE’s Metal renderer, triggered by improper buffer sizing. In practical terms, this could lead to memory corruption, browser crashes, or—worst case—arbitrary code execution. The kind of bug that lets attackers do more than crash your browser tab.

This marks the eighth zero-day vulnerability in Chrome that’s been either actively exploited or publicly demonstrated since the start of 2025. The others include CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, CVE-2025-6558, CVE-2025-10585, and CVE-2025-13223.

Additional Fixes in This Update

Google also addressed two other medium-severity bugs:

  • CVE-2025-14372 — Use-after-free vulnerability in Password Manager
  • CVE-2025-14373 — Inappropriate implementation in Toolbar

Use-after-free vulnerabilities are a favorite among attackers because they allow manipulation of memory that’s already been released—potentially leading to code execution or data theft.

Google’s decision to withhold technical specifics isn’t unusual. When an exploit is already circulating in the wild, disclosing the exact mechanism would only help other attackers reverse-engineer the patch and develop their own attacks. It’s a calculated trade-off between transparency and protecting the billions of Chrome users worldwide.

That said, the lack of attribution means we don’t know if this is state-sponsored activity, a targeted campaign against specific organizations, or something broader. Given Chrome’s market dominance, even a narrow exploit can have significant reach.

How to Protect Yourself

Update Chrome immediately to version 143.0.7499.109/.110 for Windows and macOS, or 143.0.7499.109 for Linux. Here’s how:

  1. Open Chrome and click the three-dot menu (⋮) in the top right
  2. Go to Help → About Google Chrome
  3. Chrome will automatically check for updates and download the latest version
  4. Click Relaunch to complete the update

If you’re using other Chromium-based browsers like Microsoft Edge, Brave, Opera, or Vivaldi, keep an eye out for their respective patches—they all share the same underlying Chromium code.

The Bigger Picture

Browser security has become increasingly critical as we spend more time online and browsers handle everything from banking to healthcare to corporate applications. An exploited browser vulnerability, especially one in a graphics rendering engine, can be weaponized through malicious websites—no download required.

This is why patching matters. Unlike phishing attacks that rely on tricking users, zero-day exploits can compromise systems silently. You don’t need to click a suspicious link or download a sketchy file—just visiting a compromised webpage could be enough.

The fact that 2025 has already seen eight Chrome zero-days speaks to both the browser’s popularity (it’s an attractive target) and the intensity of modern threat research. Whether these exploits are discovered by researchers or threat actors first is often a race against time.

Update your browser. It takes 30 seconds and might save you a whole lot of trouble.

Share This Article
Follow:
Stephanie is our wordsmith, transforming technical research into engaging content that resonates with users. Her expertise in cybercrime prevention and online safety ensures that Gridinsoft's advice is accessible to everyone—whether they’re tech-savvy or not.
Leave a Comment

AI Assistant

Hello! 👋 How can I help you today?