CVE-2025-13633

8.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Google Chrome's Digital Credentials feature that allows heap corruption. Attackers who compromise the renderer process can potentially execute arbitrary code or cause browser crashes via malicious HTML pages. All Chrome users on affected versions are vulnerable.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 143.0.7499.41
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Digital Credentials feature to be enabled (typically default).

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Browser crash (denial of service) or limited sandbox escape allowing further exploitation.

🟢

If Mitigated

Browser crash with no data loss if sandbox holds, or blocked exploit attempt.

🌐 Internet-Facing: HIGH - Exploitable via visiting malicious websites or viewing malicious content.
🏢 Internal Only: MEDIUM - Requires user interaction but could be exploited via internal phishing or compromised sites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires renderer process compromise first, but then exploitation is straightforward. No public exploits known at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 143.0.7499.41 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' when prompted.

🔧 Temporary Workarounds

Disable Digital Credentials

all

Temporarily disable the vulnerable feature via Chrome flags

Navigate to chrome://flags/#digital-credentials
Set to 'Disabled'
Relaunch Chrome

🧯 If You Can't Patch

  • Use Chrome's site isolation and sandboxing features (enabled by default)
  • Implement web filtering to block known malicious sites and restrict user browsing

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: if below 143.0.7499.41, you are vulnerable.

Check Version:

On command line: google-chrome --version (Linux) or 'chrome://version' in browser address bar

Verify Fix Applied:

Confirm Chrome version is 143.0.7499.41 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports
  • Renderer process termination events
  • Unexpected browser restarts

Network Indicators:

  • Requests to known exploit domains
  • Unusual outbound connections after visiting websites

SIEM Query:

source="chrome" AND (event="crash" OR event="renderer_killed") AND version<"143.0.7499.41"

🔗 References

📤 Share & Export