6 min read
6 min read

Google has released a critical security update to fix another zero-day flaw in Chrome. A zero-day refers to a vulnerability that attackers exploit before developers can patch it.
This marks the latest in a series of urgent fixes rolled out in 2025. Users are strongly urged to update their browsers immediately. Delaying updates can expose devices to active threats. Staying current with patches is the best defense.

The newly patched flaw has been assigned the CVE-2025-10585 identifier. It is a high-severity vulnerability affecting Chrome’s V8 JavaScript engine.
The flaw arises from improper handling of memory types. This can allow attackers to execute malicious code on a victim’s system. Google classified it as a serious risk due to active exploitation. The assigned CVE helps researchers and users track the issue.

The vulnerability was caused by a “type confusion” error in the V8 JavaScript engine. This type of bug occurs when software misinterprets data types during execution. Such confusion may lead to memory corruption and remote code execution.
Since V8 powers many Chrome features, the impact is wide-ranging. Attackers can exploit it by tricking users into visiting compromised websites. Fixing the flaw quickly was a top priority.

Alongside this zero-day, Google also patched several additional flaws. These included security issues found in different Chrome components. While not all were exploited, patching them prevents potential misuse.
Google assigns CVE identifiers to major security issues for transparency and tracking, which helps researchers and users monitor patches. Users benefit from applying all patches together in a single update.

Google confirmed that CVE-2025-10585 was already being exploited. This means that attackers were actively targeting Chrome users before the fix was implemented.
Because Google has confirmed that an exploit exists in the wild, attackers may have already used it to compromise systems or extract data, although full impact details haven’t been disclosed.
Such cases highlight the urgency of quick patch adoption. Waiting to update can leave systems wide open to ongoing attacks.

The update has been released for Windows, macOS, and Linux versions of Chrome. Other Chromium-based browsers, like Microsoft Edge, Brave, and Opera, will also integrate the patch.
Since these browsers share the Chromium core, they face the same risks. Users of these platforms should expect updates soon. Cross-platform fixes ensure consistency in security. No system is safe until the patch is applied.

Users can manually update Chrome by opening the browser menu and selecting “Help” → “About Google Chrome.” The browser will automatically check for and apply available updates. Restarting Chrome is required to complete the installation.
Skipping this step leaves the old version running. Manual updates are essential for those who don’t want to wait for automatic rollout. Taking a minute to check can save hours of recovery later.

Chrome typically rolls out updates automatically in the background. Most users are protected without requiring additional steps. However, automatic updates may be delayed depending on the region or settings.
Ensuring auto-updates are enabled minimizes security risks. Even so, manual verification is wise during zero-day crises. Automatic patching remains one of Chrome’s strongest security features.

Failing to update leaves systems exposed to ongoing exploitation. Attackers could install malware, steal data, or hijack devices remotely. Zero-days often spread quickly through malicious websites or phishing emails.
Once a flaw is public, exploitation usually accelerates. Outdated browsers are soft targets for cybercriminals. The cost of inaction can be severe compared to the ease of updating.

Because many browsers rely on Chromium, this flaw extends beyond Google Chrome. Edge, Brave, Opera, and Vivaldi all share the same vulnerable engine. Google’s patch will flow into these browsers in upcoming releases.
Users must apply updates as soon as their browser vendors publish them. Cross-vendor cooperation ensures ecosystem security. This demonstrates the importance of shared vigilance.

Google credited its Threat Analysis Group (TAG) for discovering and reporting the flaw. TAG specializes in identifying targeted attacks, often linked to nation-state actors. Their work helps close vulnerabilities before they spread further.
Google thanked the researchers for their contribution. This collaboration underscores the value of security research. The quick turnaround between discovery and fix shows TAG’s effectiveness.

This is the sixth zero‑day for Chrome patched in 2025, underscoring how highly targeted browsers remain in cyberattacks.
The increasing frequency reflects the popularity of Chrome as a target. Attackers prioritize browsers because they are gateways to online activity.
Each incident demonstrates the evolving sophistication of cyber threats. Google continues to respond rapidly but acknowledges the ongoing challenge. Users must remain alert to frequent updates.

Google has withheld full technical details about CVE-2025-10585. This is standard practice when zero-days are under active attack. Revealing too much could help hackers craft more exploits.
Once most users have updated, more information may be released. Transparency is balanced with security concerns. This approach protects users while still informing the community.

Type confusion flaws like this can lead to memory corruption. Such vulnerabilities allow attackers to bypass security boundaries. In worst-case scenarios, they enable remote code execution.
This means malicious actors could take full control of an affected device. The risks extend to both personal and enterprise systems. Memory safety remains one of the hardest challenges in browser development.
Want AI at your fingertips in every Chrome tab? Explore Google launches Gemini integration right inside Chrome.

The latest Chrome zero-day highlights the constant battle between developers and attackers. Google has acted quickly to patch the flaw, but user action is equally critical. Updating immediately ensures you are protected against active threats.
Whether you use Chrome or another Chromium browser, vigilance is essential. Regular updates are the simplest yet most powerful defense. The message is clear: do not wait to update.
Is your browser history safe from hidden exploits? Explore how a Chrome security flaw let hackers track your browsing.
Do you usually rely on automatic updates for Chrome, or do you prefer checking manually when zero-day flaws are announced? Tell us in the comments.
Read More From This Brand:
Don’t forget to follow us for more exclusive content right here on MSN.
This slideshow was made with AI assistance and human editing.
This content is exclusive for our subscribers.
Get instant FREE access to ALL of our articles.
Dan Mitchell has been in the computer industry for more than 25 years, getting started with computers at age 7 on an Apple II.
We appreciate you taking the time to share your feedback about this page with us.
Whether it's praise for something good, or ideas to improve something that
isn't quite right, we're excited to hear from you.
Stay up to date on all the latest tech, computing and smarter living. 100% FREE
Unsubscribe at any time. We hate spam too, don't worry.

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!