CVE-2025-27038

7.5 HIGH CISA KEV

📋 TL;DR

This vulnerability allows memory corruption in Chrome's graphics rendering through Adreno GPU drivers, potentially enabling arbitrary code execution. It affects Chrome users on devices with Qualcomm Adreno GPUs. Attackers could exploit this to compromise browser security.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: Chrome versions prior to 128.0.6613.84
Operating Systems: Android, Windows, Linux with Qualcomm Adreno GPU
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Qualcomm Adreno GPU driver; most vulnerable on Android devices with Qualcomm chipsets.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through browser-based remote code execution, allowing attacker control over the device.

🟠

Likely Case

Browser crash or sandbox escape leading to limited code execution within browser context.

🟢

If Mitigated

Browser crash without code execution if sandboxing holds, causing denial of service.

🌐 Internet-Facing: HIGH - Browser-based vulnerabilities are directly exposed to web content.
🏢 Internal Only: MEDIUM - Requires user interaction with malicious content but can be exploited internally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

CISA confirms known exploitation; requires user to visit malicious website or view malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Chrome 128.0.6613.84 and later

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Open Chrome settings 2. Navigate to 'About Chrome' 3. Allow browser to check for and install updates 4. Restart Chrome when prompted

🔧 Temporary Workarounds

Disable GPU acceleration

all

Temporarily disable hardware acceleration to bypass vulnerable GPU driver

chrome://settings/system -> Disable 'Use hardware acceleration when available'

🧯 If You Can't Patch

  • Restrict browser to trusted websites only using network policies
  • Implement application allowlisting to prevent unauthorized browser execution

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: chrome://settings/help - if version is below 128.0.6613.84, system is vulnerable

Check Version:

chrome://version

Verify Fix Applied:

Confirm Chrome version is 128.0.6613.84 or higher in chrome://settings/help

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash logs with GPU process termination
  • Unexpected Chrome renderer process crashes

Network Indicators:

  • Outbound connections from Chrome to suspicious domains following crash

SIEM Query:

source="chrome_logs" AND (event="gpu_process_crash" OR event="renderer_crash")

🔗 References

📤 Share & Export