Article Details
Scrape Timestamp (UTC): 2025-07-16 08:01:52.794
Source: https://thehackernews.com/2025/07/urgent-google-releases-critical-chrome.html
Original Article Text
Click to Toggle View
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild. Google on Tuesday rolled out fixes for six security issues in its Chrome web browser, including one that it said has been exploited in the wild. The high-severity vulnerability in question is CVE-2025-6558 (CVSS score: 8.8), which has been described as an incorrect validation of untrusted input in the browser's ANGLE and GPU components. "Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page," according to the description of the flaw from the NIST's National Vulnerability Database (NVD). ANGLE, short for "Almost Native Graphics Layer Engine," acts as a translation layer between Chrome's rendering engine and device-specific graphics drivers. Vulnerabilities here can let attackers escape Chrome's sandbox by abusing low-level GPU operations that browsers usually keep isolated, making this a rare but powerful path to deeper system access. Clément Lecigne and Vlad Stolyarov of Google's Threat Analysis Group (TAG) have been credited with discovering and reporting the zero-day vulnerability on June 23, 2025. The exact nature of the attacks weaponizing the flaw has not been disclosed, but Google acknowledged that an "exploit for CVE-2025-6558 exists in the wild." That said, the discovery by TAG alludes to the possibility of nation-state involvement. The development comes about two weeks after Google addressed another actively exploited Chrome zero-day (CVE-2025-6554, CVSS score: 8.1), which was also reported by Lecigne on June 25, 2025. Google has resolved a total of five zero-day vulnerabilities in Chrome that have been either actively exploited or demonstrated as a proof-of-concept (PoC) since the start of the year. This includes: CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, and CVE-2025-6554. For most users, a sandbox escape like this means that even if you visit a malicious site, it could potentially break out of the browser's security bubble and interact with your system. This is especially critical in targeted attacks where just opening a webpage could trigger silent compromise—no downloads or clicks needed. To safeguard against potential threats, it's advised to update their Chrome browser to versions 138.0.7204.157/.158 for Windows and Apple macOS, and 138.0.7204.157 for Linux. To make sure the latest updates are installed, users can navigate to More > Help > About Google Chrome, and select Relaunch. Users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available. Issues like this often fall under broader categories like GPU sandbox escapes, shader-related bugs, or WebGL vulnerabilities. While not always headline-grabbing, they tend to resurface in chained exploits or targeted attacks. If you follow Chrome security updates, it's worth watching for terms like graphics driver flaws, privilege boundary bypass, and memory corruption in rendering paths—they often point to the next round of patch-worthy bugs.
Daily Brief Summary
Google has issued an update for Chrome, addressing a critical vulnerability, CVE-2025-6558, actively exploited in the wild.
The security flaw, rated 8.8 CVSS, involves inadequate validation of untrusted input in the browser's ANGLE and GPU components, enabling attackers to escape Chrome’s sandbox.
Discovered by Google's Threat Analysis Group, the flaw's exploitation hints at possible nation-state involvement.
This is one of five zero-day vulnerabilities patched in Chrome this year, all either actively exploited or demonstrated as PoC.
Users are urged to update their Chrome to the latest versions available for Windows, macOS, and Linux to mitigate risk.
The vulnerability allows attackers to execute attacks directly from a malicious webpage without any user interaction like downloads or clicks.
Browsers using the Chromium engine, including Microsoft Edge and Opera, should also update promptly as the same vulnerabilities may affect them.