Cyber Security News

Critical Chrome Vulnerability Allows Attackers to Execute Arbitrary Code

Google has recently rolled out a critical security update for its Chrome browser, addressing vulnerabilities that could potentially allow attackers to execute arbitrary code.

This update is part of a broader effort to ensure user safety in an increasingly threat-ridden digital landscape.

The latest version, 134.0.6998.117/.118, is being rolled out across Windows, Mac, and Linux platforms over the coming days and weeks.

Critical Chrome Vulnerability

One of the key vulnerabilities identified is CVE-2025-2476, a “use after free” issue affecting the Lens feature.

This critical flaw was reported by SungKwon Lee of Enki Whitehat on March 5, 2025. The “use after free” vulnerability allows attackers to potentially execute arbitrary code, exploiting memory that has already been freed by the program.

This type of bug is particularly concerning as it can lead to remote code execution in certain scenarios.

The update includes two security fixes, with contributions from external researchers like SungKwon Lee.

Google’s internal security audits, fuzzing, and other initiatives have also been instrumental in identifying and addressing a range of potential security issues.

Tools such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL have played a crucial role in detecting these vulnerabilities before they could be exploited.

This update underscores the importance of continuous security efforts by both Google and external researchers.

As digital threats evolve, collaborations like these are vital in protecting users from sophisticated attacks. The restricted access to bug details ensures that fixes are implemented widely before potential exploits are made public, reducing the window of vulnerability.

Impact and Future Directions

For users, the update is set to roll out automatically over the coming weeks. Those interested in switching to different release channels can find more information on how to do so by visiting the Chrome support pages.

 The community is encouraged to report any new issues via the Chrome bug reporting system. This proactive approach to security, coupled with robust community involvement, helps maintain Chrome’s position as a secure web browsing platform.

This security update is a timely reminder of the ongoing battle against cyber threats. As digital security evolves, tech giants like Google must maintain a strong focus on vulnerability detection and repair.

By working together, researchers and developers can safeguard the online experiences of millions of Chrome users worldwide.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

TAG-110 Hackers Deploy Malicious Word Templates in Targeted Attacks

The Russia-aligned threat actor TAG-110, also linked to UAC-0063 and APT28 (BlueDelta) with medium confidence…

48 minutes ago

Winos 4.0 Malware Masquerades as VPN and QQBrowser to Target Users

A sophisticated malware campaign deploying Winos 4.0, a memory-resident stager, has been uncovered by Rapid7,…

1 hour ago

NETGEAR Router Flaw Allows Full Admin Access by Attackers

A severe authentication bypass vulnerability (CVE-2025-4978) has been uncovered in NETGEAR’s DGND3700v2 wireless routers, enabling…

2 hours ago

Operation Endgame Crushes DanaBot Malware, Shuts Down 150 C2 Servers and Halts 1,000 Daily Attacks

Operation Endgame II has delivered a devastating strike against DanaBot, a notorious malware that has…

2 hours ago

Apple XNU Kernel Flaw Enables Attackers to Escalate Privileges

Apple has released urgent security patches addressing CVE-2025-31219, a high-severity vulnerability in its XNU kernel…

3 hours ago

Inside LockBit: Data Leak Reveals Leading Affiliates and How They Operate

A massive data leak from the LockBit ransomware group, published on its hijacked leak site,…

3 hours ago