CVE-2025-9864

Google · Google Multiple Products

A high-severity vulnerability has been identified in the V8 JavaScript engine used by Google Chrome and other Google products.

Executive summary

A high-severity vulnerability has been identified in the V8 JavaScript engine used by Google Chrome and other Google products. This flaw, known as a "Use After Free," can be exploited by a remote attacker who tricks a user into visiting a specially crafted malicious website, potentially allowing the attacker to execute arbitrary code and compromise the affected system.

Vulnerability

This is a use-after-free memory corruption vulnerability within the V8 JavaScript and WebAssembly engine. An attacker can create a malicious web page with specific JavaScript code that manipulates memory objects in a way that causes the V8 engine to reference a memory location after it has been deallocated. Successful exploitation of this flaw can corrupt memory, leading to a crash or, more critically, allowing the attacker to execute arbitrary code within the context of the browser's renderer process. A sophisticated attacker could chain this with a separate sandbox escape vulnerability to gain full control over the host operating system.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could have a significant negative impact on the business. An attacker could leverage this flaw to install malware, such as ransomware or spyware, steal sensitive corporate data accessed through the browser (including credentials, financial information, and intellectual property), or use the compromised workstation as a foothold to move laterally within the corporate network. Given the ubiquitous use of Google Chrome in enterprise environments, a large number of systems are likely at risk.

Remediation

Immediate Action: Apply vendor security updates immediately. All instances of Google Chrome should be updated to version 140 or later to mitigate this vulnerability. After patching, it is recommended to monitor for any exploitation attempts that may have occurred prior to the update and review relevant access logs for signs of compromise.

Proactive Monitoring: Monitor endpoint detection and response (EDR) systems for alerts related to anomalous browser process behavior, such as unexpected child processes spawned by chrome.exe or memory corruption exploit attempts. Network monitoring should focus on identifying unusual outbound connections from workstations to unknown or malicious domains, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, organizations should consider implementing compensating controls. These include using a secure web gateway (SWG) with up-to-date threat intelligence to block access to known malicious websites, ensuring endpoint security solutions with advanced exploit protection are enabled, and restricting user permissions to limit the impact of a potential compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the potential for remote code execution through a common attack vector (web browsing), this vulnerability poses a critical risk to the organization. Although there is no public exploit available at this time and it is not on the CISA KEV list, the history of V8 vulnerabilities suggests that exploitation is likely. We strongly recommend that all organizations prioritize the deployment of the vendor-supplied security updates to all affected systems immediately to prevent potential compromise.