
Read, Digital Desk : CERT-In has released an alert with high severity on its scale regarding use of Google Chrome on desktop systems. This alert is under CIVN-2025-0099 from May 16, 2025. With this alert, they also mention serious vulnerabilities that could let systems take control over execution of arbitrary codes on affected systems.
Recommended Actions for Users
To avert vulnerabilities they may exploit, users are advised to update Google Chrome to version 136.0.7103.113 or later.
Exploitation Risk
Exploitation of these vulnerabilities has dire consequences; attackers have unfettered access to critical data and can render systems dangerously unstable. A die-hard flaw CVE-2025-4664 is already in use and being exploited in the wild.
Exploited Risks
With basic steps like just clicking on a compromised or malicious website, users risk code execution on their systems should they wish to unleash a full compromise.
Who’s Affected
With the advisory, all users of Google Chrome Non Mobile version are affected, more so individuals and organization using Windows, Mac and Linux. This is on destaque as payload Chrome has a larger coverage.
Vulnerability Scoped:
The loader and Mojo part of Steam are primarily responsible for terminal ingenuity and interprocessing control respectively. This explains the Norm ache security flaw.
These vulnerabilities stem from weaknesses in Chrome’s Loader and Mojo components which are dominant for loading content and managing interprocess communication respectively.
Potential Exploitation Risks:
CERT-In also indicates that exploitation of these vulnerabilities will facilitate cybercriminals to have open backdoor access to critical information making devices sensitive to hack.
Chrome bolstered its security from 136 versions onward therefore protecting user data on Windows and Mac systems while exploiting version below is the main stay for linux users.
These are the extracts marked for exploit with these lesions inflicted.
Windows and Mac pose a critical vulnerability security risk. By accessing different system components posing as legitimate users, Chrome becomes increasingly prone to core steganographic and espionage attacks.
Exploitation Risk
CERT-In also indicates that exploitation of this vulnerability will facilitate cybercriminals to have open backdoor access to sensitive information making devices easily susceptible to hacking.
Follow the official instructions on the Chrome Releases Blog or use Chrome’s in-built update feature.
You should restart your device after updating so that the changes made during the update will be accepted.
Immediate mitigation steps need to be taken in order to block attackers from taking advantage of these security weaknesses.
Read More: How to Use Stage Manager on iPad: A Step-by-Step Guide for Better Multitasking
-
Mizoram advances to the quarterfinals of the Swami Vivekananda Men’s U20 NFC
-
Two La Liga berths in Europe are up for grabs
-
Will Hardik Pandya ‘Yardstick’ Put an End to Jasprit Bumrah’s Dreams of Becoming Test Captain?
-
IPL2025: Sai Sudharsan and Shubman Gill Set a Record With Their Dominant Batting Effort Against DC
-
“I haven’t had any alcohol since January,” the former CSK player said while undergoing injury rehabilitation