CVE-2025-14372
📋 TL;DR
A use-after-free vulnerability in Google Chrome's Password Manager allows remote attackers to potentially escape the browser sandbox via a crafted HTML page. This affects Chrome users on all platforms who haven't updated to the patched version. The vulnerability could lead to arbitrary code execution outside Chrome's security boundaries.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through sandbox escape leading to arbitrary code execution with user privileges, potentially enabling credential theft, malware installation, and lateral movement.
Likely Case
Limited sandbox escape allowing access to browser data and some system resources, potentially leading to credential theft from the password manager.
If Mitigated
Contained within Chrome's sandbox with no system impact if proper browser isolation and security controls are in place.
🎯 Exploit Status
Exploitation requires bypassing Chrome's security mitigations including ASLR and CFG, but the use-after-free primitive provides a strong foundation for exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 143.0.7499.110
Vendor Advisory: https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html
Restart Required: Yes
Instructions:
1. Open Chrome and click the three-dot menu. 2. Go to Help > About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the update applied.
🔧 Temporary Workarounds
Disable Password Manager
allTemporarily disable Chrome's built-in password manager to remove the vulnerable component
chrome://settings/passwords > Turn off 'Offer to save passwords'
Enable Site Isolation
allEnsure site isolation is enabled for additional process separation
chrome://flags/#site-isolation-trial-opt-out > Set to 'Disabled'
🧯 If You Can't Patch
- Use browser isolation solutions like remote browser isolation (RBI) or containerized browsing
- Implement application allowlisting to restrict execution of unauthorized processes from browser escapes
🔍 How to Verify
Check if Vulnerable:
Check Chrome version via chrome://settings/help or chrome://version and verify it's below 143.0.7499.110
Check Version:
On Windows: "C:\Program Files\Google\Chrome\Application\chrome.exe" --version
On macOS: /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version
On Linux: google-chrome --version
Verify Fix Applied:
Confirm Chrome version is 143.0.7499.110 or higher and that the update was successfully applied
📡 Detection & Monitoring
Log Indicators:
- Chrome crash reports with memory corruption signatures
- Unexpected child process creation from Chrome
- Access to sensitive system resources by Chrome processes
Network Indicators:
- Connections to known malicious domains hosting exploit code
- Unusual outbound connections from Chrome processes
SIEM Query:
process_name:"chrome.exe" AND (event_id:1000 OR event_id:1001) AND description:"EXCEPTION_ACCESS_VIOLATION" OR process_parent_name:"chrome.exe" AND process_name NOT IN ("chrome.exe", "chrome_child.dll")