Let's see how we can help you!
Leave a message and our dedicated advisor will contact you.
Send us a message
0/10000
Leave a message and our dedicated advisor will contact you.
The year 2025 was marked by Google's intense battle against zero-day vulnerabilities in the Chrome browser. During this period, eight critical vulnerabilities that were being actively exploited by hackers were eliminated. Each was classified as a High Severity threat, reaching an average CVSS score of 8.5.
Such high activity from threat actors—including state-sponsored groups and commercial spyware providers—demonstrates that Chrome remains a primary target for advanced cyberattacks worldwide.
Attacks focused on fundamental browser elements: the V8 JavaScript engine, sandbox security mechanisms, and graphics components. All incidents have been recorded in the official CISA Known Exploited Vulnerabilities (KEV) catalog.
| CVE Identifier | Discovery Month | Vulnerability Type / Component |
|---|---|---|
| CVE-2025-2783 | March | Sandbox escape |
| CVE-2025-4664 | May | Account hijacking |
| CVE-2025-5419 | June | V8 out-of-bounds memory access |
| CVE-2025-6554 | July | V8 engine flaw |
| CVE-2025-6558 | July | Unspecified flaw |
| CVE-2025-10585 | September | V8 type confusion |
| CVE-2025-13223 | November | V8 type confusion |
| CVE-2025-14174 | December | ANGLE / GPU layer flaw |
The V8 engine proved to be the weakest link. Most vulnerabilities found there (e.g., CVE-2025-10585) were based on "Type Confusion." This allows attackers to manipulate how the browser interprets data in memory, ultimately enabling Remote Code Execution (RCE) on the victim's device.
The March vulnerability, CVE-2025-2783, was particularly dangerous. It allowed malicious code to "escape" the browser's isolated environment and gain direct access to the operating system's files and functions.
Towards the end of the year, hacker attention shifted to the ANGLE (Almost Native Graphics Layer Engine) and the Mojo IPC communication system. For instance, CVE-2025-14174 enabled memory manipulation in processes responsible for rendering images.
Experts point to two main groups of perpetrators:
In one notable case (Operation "Forum Troll"), a Chrome vulnerability was used to infect targets with advanced spyware known as LeetAgent.
Despite the implementation of new security technologies like MiraclePtr, Chrome remains a high-value target due to its global popularity.
Recommendations for Organizations:

Chief Technology Officer at SecurHub.pl
PhD candidate in neuroscience. Psychologist and IT expert specializing in cybersecurity.
Traditional cybersecurity is waiting for a breach. Threat Hunting is meeting it halfway. Discover why paranoia (the controlled kind) is the healthiest strategy for your organization.
IAM misconfiguration is the leading cause of cloud incidents. Discover differences between AWS, Azure, and GCP in Shared Responsibility Model, how to implement Zero Trust, avoid "toxic combinations" of permissions, secure CMK keys, and automate CSPM for NIS2 compliance.
The reality of Industry 4.0 marks the end of factory isolation. Discover how the IEC 62443 standard turns traditional thinking about critical infrastructure protection upside down.
Loading comments...