CVE-2025-12429

Google · Google Multiple Products

A high-severity vulnerability has been identified in the V8 JavaScript engine used by Google Chrome and other Google products.

Executive summary

A high-severity vulnerability has been identified in the V8 JavaScript engine used by Google Chrome and other Google products. This flaw, tracked as CVE-2025-12429, could allow a remote attacker to execute arbitrary code on a victim's system simply by tricking them into visiting a malicious website. Successful exploitation could lead to a full system compromise, data theft, or the installation of malware.

Vulnerability

The vulnerability is an "inappropriate implementation" within the V8 JavaScript engine. This type of flaw typically points to a logic error in how the engine processes and handles JavaScript code, potentially leading to memory corruption issues such as heap corruption or type confusion. An attacker can exploit this by crafting a malicious webpage with specific JavaScript code that triggers the flaw when rendered by a vulnerable browser, resulting in arbitrary code execution in the context of the browser's sandboxed process.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. A successful attack could lead to the compromise of user endpoints, enabling an attacker to steal sensitive information such as login credentials, financial data, and proprietary documents stored on the system or accessed through the browser. Further consequences include the deployment of ransomware, spyware, or using the compromised machine as a foothold to launch further attacks against the internal network, potentially leading to a widespread data breach, financial loss, and severe reputational damage.

Remediation

Immediate Action: Organizations must prioritize the deployment of Google Chrome version 142 or later across all managed endpoints to mitigate this vulnerability. This update should be applied immediately using established patch management systems. Following the update, security teams should actively monitor for any signs of exploitation attempts and review endpoint and network logs for indicators of compromise.

Proactive Monitoring: Security teams should monitor for anomalous behavior associated with browser processes. This includes looking for endpoint detection and response (EDR) alerts for suspicious process creation originating from chrome.exe (e.g., spawning cmd.exe or powershell.exe). Network monitoring should focus on identifying unusual outbound connections from workstations to unknown or malicious IP addresses, which could indicate a command-and-control (C2) channel.

Compensating Controls: If immediate patching is not feasible, the following controls can help reduce the risk:

  • Utilize a web filtering solution to block access to uncategorized or known malicious websites.
  • Ensure EDR solutions are properly configured to detect and block common browser exploitation techniques.
  • Enforce the principle of least privilege on user workstations to limit the impact of a potential compromise.
  • Reinforce user security awareness training, advising users to be cautious of unsolicited links and unfamiliar websites.

Exploitation status

Public Exploit Available: false

Analyst recommendation

We strongly recommend that all vulnerable instances of Google Chrome are updated to version 142 or newer with the highest priority. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high CVSS score and the potential for remote code execution from a simple website visit present a critical risk. Due to the role of browsers as a primary initial access vector, this update should be treated as an emergency change and deployed across the environment without delay to prevent potential exploitation.