Was this helpful?
Thumbs UP Thumbs Down

Another Chrome zero-day flaw fixed – update your browser now

laptop computer displaying logo of google chrome
Google chrome on smartphone screen with user interface.

Chrome zero-day fixed

Google has released a critical security update to fix another zero-day flaw in Chrome. A zero-day refers to a vulnerability that attackers exploit before developers can patch it.

This marks the latest in a series of urgent fixes rolled out in 2025. Users are strongly urged to update their browsers immediately. Delaying updates can expose devices to active threats. Staying current with patches is the best defense.

Google chrome browser displayed on a screen

What is CVE-2025-10585?

The newly patched flaw has been assigned the CVE-2025-10585 identifier. It is a high-severity vulnerability affecting Chrome’s V8 JavaScript engine.

The flaw arises from improper handling of memory types. This can allow attackers to execute malicious code on a victim’s system. Google classified it as a serious risk due to active exploitation. The assigned CVE helps researchers and users track the issue.

Developer coding on computer

V8 engine type confusion

The vulnerability was caused by a “type confusion” error in the V8 JavaScript engine. This type of bug occurs when software misinterprets data types during execution. Such confusion may lead to memory corruption and remote code execution.

Since V8 powers many Chrome features, the impact is wide-ranging. Attackers can exploit it by tricking users into visiting compromised websites. Fixing the flaw quickly was a top priority.

cyber attack zeroday vulnerability text in foreground screen hands of

Other Chrome vulnerabilities patched

Alongside this zero-day, Google also patched several additional flaws. These included security issues found in different Chrome components. While not all were exploited, patching them prevents potential misuse.

Google assigns CVE identifiers to major security issues for transparency and tracking, which helps researchers and users monitor patches. Users benefit from applying all patches together in a single update.

risk management strategies

Exploit already in the wild

Google confirmed that CVE-2025-10585 was already being exploited. This means that attackers were actively targeting Chrome users before the fix was implemented.

Because Google has confirmed that an exploit exists in the wild, attackers may have already used it to compromise systems or extract data, although full impact details haven’t been disclosed.

Such cases highlight the urgency of quick patch adoption. Waiting to update can leave systems wide open to ongoing attacks.

laptop computer displaying logo of windows

Supported browsers and platforms

The update has been released for Windows, macOS, and Linux versions of Chrome. Other Chromium-based browsers, like Microsoft Edge, Brave, and Opera, will also integrate the patch.

Since these browsers share the Chromium core, they face the same risks. Users of these platforms should expect updates soon. Cross-platform fixes ensure consistency in security. No system is safe until the patch is applied.

Hand interacted with update concept

How to manually update?

Users can manually update Chrome by opening the browser menu and selecting “Help” → “About Google Chrome.” The browser will automatically check for and apply available updates. Restarting Chrome is required to complete the installation.

Skipping this step leaves the old version running. Manual updates are essential for those who don’t want to wait for automatic rollout. Taking a minute to check can save hours of recovery later.

process automation

Automatic updates importance

Chrome typically rolls out updates automatically in the background. Most users are protected without requiring additional steps. However, automatic updates may be delayed depending on the region or settings.

Ensuring auto-updates are enabled minimizes security risks. Even so, manual verification is wise during zero-day crises. Automatic patching remains one of Chrome’s strongest security features.

Risk word written on cubes.

Risk if not patched

Failing to update leaves systems exposed to ongoing exploitation. Attackers could install malware, steal data, or hijack devices remotely. Zero-days often spread quickly through malicious websites or phishing emails.

Once a flaw is public, exploitation usually accelerates. Outdated browsers are soft targets for cybercriminals. The cost of inaction can be severe compared to the ease of updating.

Opera logo multiplatform web browser

Broader Chromium-based browser impact

Because many browsers rely on Chromium, this flaw extends beyond Google Chrome. Edge, Brave, Opera, and Vivaldi all share the same vulnerable engine. Google’s patch will flow into these browsers in upcoming releases.

Users must apply updates as soon as their browser vendors publish them. Cross-vendor cooperation ensures ecosystem security. This demonstrates the importance of shared vigilance.

Hands holding a wood engrave with word "threat".

Google Threat Analysis Group role

Google credited its Threat Analysis Group (TAG) for discovering and reporting the flaw. TAG specializes in identifying targeted attacks, often linked to nation-state actors. Their work helps close vulnerabilities before they spread further.

Google thanked the researchers for their contribution. This collaboration underscores the value of security research. The quick turnaround between discovery and fix shows TAG’s effectiveness.

numeral zero in hand a hand holds a white number

Zero-day frequency this year

This is the sixth zero‑day for Chrome patched in 2025, underscoring how highly targeted browsers remain in cyberattacks.

The increasing frequency reflects the popularity of Chrome as a target. Attackers prioritize browsers because they are gateways to online activity.

Each incident demonstrates the evolving sophistication of cyber threats. Google continues to respond rapidly but acknowledges the ongoing challenge. Users must remain alert to frequent updates.

Question mark heap on table.

Why are technical details withheld?

Google has withheld full technical details about CVE-2025-10585. This is standard practice when zero-days are under active attack. Revealing too much could help hackers craft more exploits.

Once most users have updated, more information may be released. Transparency is balanced with security concerns. This approach protects users while still informing the community.

selective focus of man holding magnifier near paper with corruption

Memory corruption potential risks

Type confusion flaws like this can lead to memory corruption. Such vulnerabilities allow attackers to bypass security boundaries. In worst-case scenarios, they enable remote code execution.

This means malicious actors could take full control of an affected device. The risks extend to both personal and enterprise systems. Memory safety remains one of the hardest challenges in browser development.

Want AI at your fingertips in every Chrome tab? Explore Google launches Gemini integration right inside Chrome.

Delay words on a small sheet of paper on a

Update without delay

The latest Chrome zero-day highlights the constant battle between developers and attackers. Google has acted quickly to patch the flaw, but user action is equally critical. Updating immediately ensures you are protected against active threats.

Whether you use Chrome or another Chromium browser, vigilance is essential. Regular updates are the simplest yet most powerful defense. The message is clear: do not wait to update.

Is your browser history safe from hidden exploits? Explore how a Chrome security flaw let hackers track your browsing.

Do you usually rely on automatic updates for Chrome, or do you prefer checking manually when zero-day flaws are announced? Tell us in the comments.

Read More From This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you like this story, you’ll LOVE our Free email newsletter. Join today and be the first to receive stories like these.

This slideshow was made with AI assistance and human editing.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.