CVE-2025-10585

9.8 CRITICAL CISA KEV

📋 TL;DR

A type confusion vulnerability in Chrome's V8 JavaScript engine allows attackers to trigger heap corruption by tricking the browser into misinterpreting object types. This affects all users running vulnerable versions of Google Chrome, potentially leading to remote code execution when visiting malicious websites.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: Versions prior to 140.0.7339.185
Operating Systems: Windows, macOS, Linux, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Extensions or security settings do not mitigate this vulnerability.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to install malware, steal data, or create persistent backdoors on affected systems.

🟠

Likely Case

Browser crash leading to denial of service, or limited code execution within the browser sandbox to steal session cookies and credentials.

🟢

If Mitigated

Browser crash with no data loss if sandboxing holds, though user may lose unsaved work in browser tabs.

🌐 Internet-Facing: HIGH - Attackers can exploit via malicious websites, ads, or compromised legitimate sites that users visit.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing emails or compromised internal web applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

CISA has added this to their Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 140.0.7339.185 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html

Restart Required: Yes

Instructions:

1. Open Chrome and click the three-dot menu. 2. Go to Help > About Google Chrome. 3. Chrome will automatically check for updates and install version 140.0.7339.185 or later. 4. Click 'Relaunch' to restart Chrome with the update applied.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript execution in Chrome to prevent exploitation

chrome://settings/content/javascript
Toggle 'Allowed (recommended)' to 'Blocked'

Use Site Isolation

all

Enable Site Isolation to contain potential exploitation

chrome://flags/#enable-site-per-process
Set to 'Enabled' and restart

🧯 If You Can't Patch

  • Use alternative browsers until Chrome can be updated
  • Implement network filtering to block known malicious domains hosting exploit code

🔍 How to Verify

Check if Vulnerable:

Check Chrome version by navigating to chrome://settings/help or clicking Help > About Google Chrome

Check Version:

On Windows: "C:\Program Files\Google\Chrome\Application\chrome.exe" --version
On macOS: /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version
On Linux: google-chrome --version

Verify Fix Applied:

Confirm version is 140.0.7339.185 or higher in About Google Chrome page

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with V8-related errors
  • Unexpected Chrome process termination in system logs
  • Security event logs showing Chrome accessing unusual memory regions

Network Indicators:

  • Chrome connecting to known malicious domains hosting exploit code
  • Unusual outbound connections following Chrome crashes

SIEM Query:

source="chrome_crash_reports" AND (message="V8" OR message="heap corruption" OR message="type confusion")

🔗 References

📤 Share & Export