CVE-2025-14372

6.1 MEDIUM

📋 TL;DR

A use-after-free vulnerability in Google Chrome's Password Manager allows remote attackers to potentially escape the browser sandbox via a crafted HTML page. This affects Chrome users on all platforms who haven't updated to the patched version. The vulnerability could lead to arbitrary code execution outside Chrome's security boundaries.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 143.0.7499.110
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All Chrome installations with Password Manager enabled are vulnerable. Enterprise deployments with managed browser policies may have additional protections.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through sandbox escape leading to arbitrary code execution with user privileges, potentially enabling credential theft, malware installation, and lateral movement.

🟠

Likely Case

Limited sandbox escape allowing access to browser data and some system resources, potentially leading to credential theft from the password manager.

🟢

If Mitigated

Contained within Chrome's sandbox with no system impact if proper browser isolation and security controls are in place.

🌐 Internet-Facing: HIGH - Attackers can exploit via malicious websites without user interaction beyond visiting the page.
🏢 Internal Only: MEDIUM - Requires user to visit a malicious internal page, but internal phishing campaigns could facilitate exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires bypassing Chrome's security mitigations including ASLR and CFG, but the use-after-free primitive provides a strong foundation for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 143.0.7499.110

Vendor Advisory: https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html

Restart Required: Yes

Instructions:

1. Open Chrome and click the three-dot menu. 2. Go to Help > About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the update applied.

🔧 Temporary Workarounds

Disable Password Manager

all

Temporarily disable Chrome's built-in password manager to remove the vulnerable component

chrome://settings/passwords > Turn off 'Offer to save passwords'

Enable Site Isolation

all

Ensure site isolation is enabled for additional process separation

chrome://flags/#site-isolation-trial-opt-out > Set to 'Disabled'

🧯 If You Can't Patch

  • Use browser isolation solutions like remote browser isolation (RBI) or containerized browsing
  • Implement application allowlisting to restrict execution of unauthorized processes from browser escapes

🔍 How to Verify

Check if Vulnerable:

Check Chrome version via chrome://settings/help or chrome://version and verify it's below 143.0.7499.110

Check Version:

On Windows: "C:\Program Files\Google\Chrome\Application\chrome.exe" --version
On macOS: /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version
On Linux: google-chrome --version

Verify Fix Applied:

Confirm Chrome version is 143.0.7499.110 or higher and that the update was successfully applied

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with memory corruption signatures
  • Unexpected child process creation from Chrome
  • Access to sensitive system resources by Chrome processes

Network Indicators:

  • Connections to known malicious domains hosting exploit code
  • Unusual outbound connections from Chrome processes

SIEM Query:

process_name:"chrome.exe" AND (event_id:1000 OR event_id:1001) AND description:"EXCEPTION_ACCESS_VIOLATION" OR process_parent_name:"chrome.exe" AND process_name NOT IN ("chrome.exe", "chrome_child.dll")

🔗 References

📤 Share & Export