CVE-2025-8578

Google · Google Multiple Products

A high-severity vulnerability has been discovered in the Cast feature of Google Chrome, affecting versions prior to 139.

Executive summary

A high-severity vulnerability has been discovered in the Cast feature of Google Chrome, affecting versions prior to 139. An attacker can exploit this flaw by luring a user to a specially crafted website, which could allow for the execution of arbitrary code on the user's system. Successful exploitation could lead to a full system compromise, enabling data theft or the installation of malicious software.

Vulnerability

The vulnerability is a use-after-free memory corruption flaw within the Cast component of Google Chrome. A remote attacker can trigger this vulnerability by convincing a user to navigate to a malicious webpage. When the webpage is rendered, it can manipulate the browser into freeing a portion of memory but retaining a pointer to it. By subsequently allocating attacker-controlled data into this freed memory location, the browser can be tricked into using the dangling pointer, leading to the execution of the attacker's malicious code within the context of the browser process. This can result in a browser crash (Denial of Service) or, more critically, arbitrary code execution.

Business impact

This is a High severity vulnerability with a CVSS score of 8.8. Successful exploitation could grant an attacker initial access to a corporate endpoint, leading to significant business risks. An attacker could execute code to steal sensitive information stored on the workstation, such as intellectual property, financial data, or user credentials. Furthermore, a compromised endpoint could serve as a beachhead for lateral movement across the network, potentially leading to a wider network breach, ransomware deployment, or persistent access by a threat actor.

Remediation

Immediate Action: Apply vendor security updates immediately. All instances of Google Chrome on corporate endpoints must be updated to version 139 or later. This action should be enforced via enterprise software management tools to ensure comprehensive coverage. In parallel, security teams should actively monitor for signs of exploitation and review endpoint and network logs for anomalous activity.

Proactive Monitoring: Monitor endpoint security logs (EDR/XDR) for any unusual child processes spawned by chrome.exe or alerts related to memory corruption. Analyze network traffic for unexpected outbound connections from user workstations to unknown destinations, which could indicate command-and-control communication. Review browser crash logs, as a failed exploitation attempt may still cause the application to terminate unexpectedly.

Compensating Controls: If immediate patching is not feasible, consider implementing temporary controls. Enforce the use of up-to-date endpoint protection and EDR solutions with robust behavioral detection capabilities. Ensure network segmentation is in place to limit an attacker's ability to move laterally from a compromised machine. If the Cast functionality is not a business requirement, consider disabling it through enterprise policies as a temporary mitigation.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high severity (CVSS 8.8) and the potential for remote code execution, this vulnerability poses a significant risk to the organization. Google Chrome is a ubiquitous application on corporate endpoints, creating a large attack surface. Although this CVE is not currently on the CISA KEV list, its characteristics make it a likely candidate for future exploitation. We strongly recommend that all system administrators prioritize the immediate deployment of the security update for Google Chrome to version 139 or newer across all managed endpoints to mitigate this threat.