Multiple Microsoft Products Vulnerabilities
July 17, 2025CoinMiner Malware – Active IOCs
July 17, 2025Multiple Microsoft Products Vulnerabilities
July 17, 2025CoinMiner Malware – Active IOCs
July 17, 2025Severity
High
Analysis Summary
CVE-2025-7657 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in WebRTC. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2025-7656 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in V8. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2025-6558 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by incorrect validation of untrusted input in ANGLE and GPU. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Impact
- Code Execution
- Buffer Overflow
- Security Bypass
Indicators of Compromise
CVE
CVE-2025-7657
CVE-2025-7656
CVE-2025-6558
Affected Vendors
Affected Products
- Google Chrome - 138.0
Remediation
Upgrade to the latest version of Google Chrome, available from the Google Chrome Releases Website.