Kimsuky APT Uses PowerShell to Execute XWorm RAT – Active IOCs
May 22, 2025Mirai Botnet aka Katana – Active IOCs
May 23, 2025Kimsuky APT Uses PowerShell to Execute XWorm RAT – Active IOCs
May 22, 2025Mirai Botnet aka Katana – Active IOCs
May 23, 2025Severity
High
Analysis Summary
On May 21, 2025, Google released an urgent early stable update for its Chrome browser to address eight newly discovered security vulnerabilities, including several high-severity issues. The most critical of these is a “Use after free” vulnerability identified as CVE-2025-5063 within Chrome’s Compositing system, which manages the visual rendering of web content. This flaw allows remote code execution by manipulating memory after it has been freed, posing a serious risk of complete system compromise. Google’s swift action rolling out version 137.0.7151.40/.41 for Windows and Mac signals the high risk of exploitation, especially since such vulnerabilities are often used in real-world attacks.
Security experts strongly recommend users update immediately, as attackers could exploit CVE-2025-5063 by luring users to malicious websites, potentially leading to data theft, malware installation, or total device takeover. Google issued the patch through a phased rollout, but the severity has prompted broader warnings. The vulnerability's classification as “high” underscores the potential danger if left unpatched, and the memory handling flaw it exploits is notoriously effective in delivering malware or establishing backdoors on victims’ systems.
In addition to the critical flaw, Google patched several medium and low-severity vulnerabilities. CVE-2025-5064 involves an inappropriate implementation in Background Fetch, enabling attackers to bypass security checks during downloads. CVE-2025-5065, found in the FileSystemAccess API, could allow malicious websites to access local files improperly. CVE-2025-5066 affects Chrome’s Messages component and might be exploited to intercept or manipulate browser communications. A lesser flaw, CVE-2025-5067, risks phishing via tab spoofing through the Tab Strip UI. While not as severe, these issues highlight the diverse attack surface within modern browsers and justify the comprehensive security update.
Users can protect themselves by navigating to Help > About Google Chrome from the browser menu to initiate the update. Chrome will automatically download and install the latest version and prompt a restart. Security professionals also advise enabling automatic updates and practicing safe browsing habits, such as avoiding suspicious links and untrusted downloads. Google has temporarily restricted bug details to prevent active exploitation, while its security team and external researchers continue monitoring for abuse.
Impact
- Sensitive Data Theft
- Code Execution
- Gain Access
Indicators of Compromise
CVE
CVE-2025-5064
CVE-2025-5065
CVE-2025-5066
CVE-2025-5067
CVE-2025-5063
Affected Vendors
Affected Products
- Google Chrome - 137.0
Remediation
- Upgrade to the latest version of Google Chrome, available from the Google Chrome Releases Website.
- Chrome will automatically check for updates and install the latest version.
- Ensure your browser is updated to version 137.0.7151.40 or 137.0.7151.41 (Windows and Mac).
- Restart Chrome to apply the update.
- Keep Chrome’s auto-update feature enabled to receive security patches as soon as they're available.
- Avoid visiting suspicious or unknown websites.
- Don’t click on unverified links or download files from untrusted sources.
- Monitor Google’s official Chrome Releases blog or security advisories for future updates and patches.
- Restrict website permissions like file access, background downloads, and messaging when not required.
- Employ a reputable antivirus or endpoint protection to detect and block exploit attempts.