CVE-2025-6558

Google · Google Multiple Products

A high-severity vulnerability has been identified in Google Chrome which could allow a remote attacker to execute arbitrary code on a user's system.

Executive summary

A high-severity vulnerability has been identified in Google Chrome which could allow a remote attacker to execute arbitrary code on a user's system. By luring a user to a specially crafted malicious website, an attacker could exploit this flaw to take control of the affected computer, potentially leading to data theft, installation of malware, or further intrusion into the network. This vulnerability presents a critical risk to endpoint security due to the widespread use of the Chrome browser.

Vulnerability

The vulnerability is classified as an "Insufficient validation of untrusted input" flaw within Google Chrome's ANGLE (Almost Native Graphics Layer Engine) and GPU process. An attacker can create a malicious webpage containing specially designed WebGL content. When a user with a vulnerable version of Chrome visits this page, the browser's GPU process fails to properly validate the input, leading to a memory corruption error, such as a heap buffer overflow. A successful exploit allows the attacker to bypass the browser's security sandbox and execute arbitrary code on the host operating system with the permissions of the logged-in user.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could have a significant business impact, including the compromise of sensitive corporate or personal data, the deployment of ransomware, or the establishment of a persistent foothold for lateral movement within the network. Because web browsers are a primary interface to the internet for most users, a remote code execution flaw represents a critical threat vector. A widespread compromise of employee workstations could lead to substantial financial loss, operational disruption, and severe reputational damage.

Remediation

Immediate Action: Apply the security update provided by Google to all affected systems immediately. All installations of Google Chrome should be updated to version 138 or later. Utilize enterprise patch management solutions to ensure the update is deployed comprehensively across all endpoints and verify successful installation.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes analyzing Endpoint Detection and Response (EDR) logs for anomalous process creation originating from chrome.exe or its child processes. Network traffic should be scrutinized for connections to unknown or suspicious command-and-control (C2) servers. Monitor system and application logs for an increase in browser or GPU process crashes, which could indicate failed exploitation attempts.

Compensating Controls: If immediate patching is not possible, organizations should implement compensating controls to reduce risk. This includes using web filtering solutions to block access to uncategorized or known malicious websites, ensuring endpoint security solutions with memory protection are enabled, and restricting user permissions to limit the impact of a potential compromise. As a temporary measure, disabling WebGL in browser settings can mitigate this specific attack vector, though it may affect the functionality of legitimate websites.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high-severity CVSS score of 8.8 and the potential for remote code execution, this vulnerability poses a critical risk to the organization. We strongly recommend that the vendor-supplied patch be deployed as a top priority across all managed endpoints. Although there are no known active exploits, the ease of exploitation (requiring only a visit to a malicious site) means the window of opportunity for attackers is large. Organizations must act decisively to remediate this vulnerability to prevent potential system compromise.