Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14174: Out of bounds memory access in Google Chrome

0
High
VulnerabilityCVE-2025-14174cvecve-2025-14174
Published: Fri Dec 12 2025 (12/12/2025, 19:20:41 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2025-14174 is a high-severity out-of-bounds memory access vulnerability in the ANGLE component of Google Chrome on Mac systems prior to version 143. 0. 7499. 110. This flaw allows a remote attacker to execute crafted HTML content that triggers out-of-bounds memory reads or writes, potentially leading to arbitrary code execution or browser compromise. Exploitation requires user interaction, such as visiting a malicious webpage, but no prior authentication is needed. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 8. 8 indicating a serious risk. Although no known exploits are currently reported in the wild, the flaw’s nature and severity make it a critical patching priority. Organizations relying on Chrome on Mac platforms should update promptly to mitigate risks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 18:12:38 UTC

Technical Analysis

CVE-2025-14174 is a vulnerability identified in the ANGLE graphics abstraction layer used by Google Chrome on Mac systems. The issue is an out-of-bounds memory access flaw classified under CWE-119, which occurs when the software accesses memory outside the bounds of allocated buffers. This can lead to memory corruption, allowing attackers to manipulate program behavior, potentially resulting in arbitrary code execution. The vulnerability is triggered remotely by a crafted HTML page that exploits the flaw in ANGLE’s handling of graphics operations. Since Chrome is widely used and ANGLE is integral to rendering graphics, this vulnerability poses a significant risk. The flaw affects Chrome versions prior to 143.0.7499.110 on Mac, and Google has assigned it a high severity rating with a CVSS 3.1 base score of 8.8. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as visiting a malicious webpage. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits have been reported yet, but the potential for exploitation is significant given the ease of triggering the vulnerability through web content. The lack of a patch link in the provided data suggests that users should monitor official Google Chrome update channels for the fixed version 143.0.7499.110 or later.

Potential Impact

The vulnerability allows remote attackers to perform out-of-bounds memory access, which can lead to arbitrary code execution within the context of the browser process. This compromises the confidentiality of user data by potentially exposing sensitive information, undermines integrity by allowing malicious code injection or manipulation of browser behavior, and affects availability by causing crashes or denial of service. Organizations worldwide that rely on Google Chrome on Mac devices are at risk of targeted attacks, especially through phishing or malicious websites. Exploitation could facilitate broader network compromise if attackers leverage the browser as an entry point. The high CVSS score reflects the severe impact and ease of exploitation, emphasizing the urgency for remediation. Although no known exploits are currently active, the vulnerability’s characteristics make it a prime candidate for future exploitation by threat actors.

Mitigation Recommendations

Organizations and users should immediately update Google Chrome on Mac systems to version 143.0.7499.110 or later once available. Until the patch is applied, users should exercise caution when browsing untrusted websites and avoid clicking on suspicious links or opening unknown HTML content. Network-level protections such as web filtering and intrusion prevention systems should be configured to block access to known malicious sites. Security teams should monitor browser crash logs and unusual behavior indicative of exploitation attempts. Employing endpoint detection and response (EDR) solutions can help detect anomalous activity related to memory corruption exploits. Additionally, organizations should ensure that their incident response plans include procedures for rapid patch deployment and user awareness training focused on phishing and social engineering vectors that could deliver crafted HTML payloads. Regular vulnerability scanning and asset inventory management will help identify and prioritize affected systems for remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2025-12-05T22:14:20.036Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c6bdfa3f11564d0c8e3ff

Added to database: 12/12/2025, 7:24:15 PM

Last enriched: 3/18/2026, 6:12:38 PM

Last updated: 3/25/2026, 1:53:40 AM

Views: 793

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses