Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

0
High
Exploit
Published: Thu Dec 11 2025 (12/11/2025, 07:09:00 UTC)
Source: The Hacker News

Description

Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild. The vulnerability, rated high in severity, is being tracked under the Chromium issue tracker ID "466192044." Unlike other disclosures, Google has opted to keep information about the CVE identifier, the affected component, and

AI-Powered Analysis

AILast updated: 12/11/2025, 22:23:32 UTC

Technical Analysis

Google Chrome has been targeted by an active in-the-wild exploit tied to a high-severity zero-day vulnerability tracked under Chromium issue ID 466192044. The vulnerability resides in the Almost Native Graphics Layer Engine (ANGLE) library, specifically within the Metal renderer implementation. The root cause is improper buffer sizing due to misuse of pixelsDepthPitch, which is based on GL_UNPACK_IMAGE_HEIGHT and can be smaller than the actual image height. This leads to a buffer overflow condition, potentially causing memory corruption, program crashes, or arbitrary code execution. Google has not disclosed the CVE identifier or detailed technical specifics to prevent exploitation by other threat actors and to allow users time to patch. The vulnerability is actively exploited, indicating real-world attacks are ongoing. Google released security updates for Chrome versions 143.0.7499.109/.110 on Windows, macOS, and Linux to address this and other vulnerabilities. The update also fixes seven other zero-day flaws exploited or demonstrated this year, plus two medium-severity issues. Users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are advised to apply patches once available. The exploit's active status and potential for arbitrary code execution make it a critical threat to user security and system integrity.

Potential Impact

European organizations face significant risks from this vulnerability due to widespread use of Google Chrome and Chromium-based browsers in enterprise environments. Exploitation could allow attackers to execute arbitrary code remotely, leading to data breaches, system compromise, and disruption of business operations. Confidentiality of sensitive information may be jeopardized if attackers gain unauthorized access. Integrity and availability of systems could be affected through memory corruption and crashes. Sectors relying heavily on browser-based applications, such as finance, healthcare, and government, are particularly vulnerable. The active exploitation increases the likelihood of targeted attacks against high-value European entities. Additionally, the lack of detailed public information complicates detection and response efforts, increasing exposure time. Failure to promptly patch could result in widespread compromise across organizations using affected browsers.

Mitigation Recommendations

European organizations should immediately update Google Chrome to versions 143.0.7499.109/.110 or later on all supported platforms. IT teams must verify successful deployment via centralized patch management tools and ensure end-users apply updates promptly. Organizations using other Chromium-based browsers should monitor vendor advisories and apply patches as soon as they are released. Network security controls should be enhanced to detect anomalous browser behavior and potential exploit attempts, including monitoring for unusual memory usage or crashes linked to ANGLE. Endpoint detection and response (EDR) solutions should be tuned to identify exploitation indicators related to buffer overflows in graphics libraries. User awareness campaigns should emphasize the importance of browser updates and caution against suspicious links or downloads. Where possible, organizations should implement application whitelisting and sandboxing to limit the impact of potential exploits. Finally, incident response plans should be reviewed and updated to address exploitation scenarios involving browser vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/12/chrome-targeted-by-active-in-wild.html","fetched":true,"fetchedAt":"2025-12-11T22:23:00.172Z","wordCount":996}

Threat ID: 693b444622246175c6a5d1b7

Added to database: 12/11/2025, 10:23:02 PM

Last enriched: 12/11/2025, 10:23:32 PM

Last updated: 12/12/2025, 4:31:29 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats