Google has recently released an urgent security update for its Chrome browser, addressing two critical vulnerabilities that could allow attackers to steal sensitive data and gain unauthorized access to users’ systems. These flaws, identified as CVE-2025-3619 and CVE-2025-3620, affect Chrome versions prior to 135.0.7049.95/.96 for Windows and Mac, and 135.0.7049.95 for Linux. The update is currently being rolled out globally and is expected to reach all users over the coming days and weeks.
Understanding the Vulnerabilities
The more severe of the two vulnerabilities, CVE-2025-3619, is a heap buffer overflow in Chrome’s Codecs component. This flaw arises from improper handling of memory when processing certain media files. An attacker could exploit this vulnerability by crafting a malicious media file that, when processed by Chrome, could lead to arbitrary code execution. This could potentially result in full system compromise, allowing the attacker to steal sensitive data, install malware, or perform other malicious activities.
The second vulnerability, CVE-2025-3620, is a use-after-free flaw in the USB component of Chrome. This type of vulnerability occurs when a program continues to use a pointer after it has been freed, leading to undefined behavior. In this case, an attacker could exploit the flaw to execute malicious code or gain unauthorized access to the system. This could be achieved by tricking the user into visiting a specially crafted website or interacting with malicious content.
Potential Impact on Users
These vulnerabilities are particularly concerning because they can be exploited remotely with minimal user interaction. Simply visiting a malicious website or opening a compromised media file could be enough to trigger the exploit. Once exploited, attackers could steal passwords, financial information, and other sensitive data stored in the browser. They could also take control of the affected device, potentially using it to launch further attacks or spread malware.
The vulnerabilities impact all users running outdated versions of Google Chrome on desktop platforms. This includes individuals, businesses, and government organizations that rely on Chrome for web browsing and data management. Users who store passwords, credit card details, or personal information in Chrome are especially vulnerable to identity theft and fraud if the browser is not updated promptly.
Google’s Response and Mitigation Measures
In response to these critical vulnerabilities, Google has released Chrome version 135.0.7049.95/.96 for Windows and Mac, and 135.0.7049.95 for Linux. This update addresses the identified flaws and enhances the overall security of the browser. To protect users while the update is being deployed, Google has temporarily restricted access to detailed bug information. This measure is intended to prevent potential attackers from exploiting the vulnerabilities before users have had a chance to update their browsers.
Google credits external security researchers Elias Hohl and @retsew0x01 for reporting the vulnerabilities. This highlights the importance of collaboration between tech companies and the security research community in identifying and mitigating potential threats. Additionally, Google’s internal security tools, including AddressSanitizer, MemorySanitizer, and libFuzzer, played a key role in detecting and mitigating these threats before they could be widely exploited.
Steps to Update Chrome
To ensure your browser is protected against these vulnerabilities, it is crucial to update Chrome to the latest version. Follow these steps to update your browser:
1. Open Chrome and click the three-dot menu in the top-right corner.
2. Navigate to Help > About Google Chrome.
3. Chrome will automatically check for updates and install the latest version.
4. Restart the browser to apply the update.
By keeping your browser up to date, you can protect yourself from potential exploits and ensure a safer browsing experience.
The Importance of Regular Updates
While there is no confirmation of active exploitation of these vulnerabilities in the wild, the nature of these flaws means that unpatched systems remain at high risk. Cybersecurity experts emphasize that regular browser updates are essential to protect against evolving threats and prevent data breaches or system compromise.
In addition to updating your browser, consider implementing the following best practices to enhance your online security:
– Use Strong, Unique Passwords: Ensure that your passwords are complex and unique for each account. Consider using a reputable password manager to keep track of them.
– Enable Two-Factor Authentication (2FA): Adding an extra layer of security can help protect your accounts even if your password is compromised.
– Be Cautious with Links and Attachments: Avoid clicking on suspicious links or downloading attachments from unknown sources, as they may contain malware or phishing attempts.
– Keep Your Operating System and Software Updated: Regularly updating your operating system and other software ensures that you have the latest security patches and features.
By staying vigilant and proactive, you can significantly reduce the risk of falling victim to cyber threats.
Conclusion
The discovery of these critical vulnerabilities in Google Chrome underscores the importance of maintaining up-to-date software and being aware of potential security threats. By promptly updating your browser and following best security practices, you can protect your personal information and maintain a secure online environment.