Kaspersky ID:
KLA78988
Detect Date:
01/14/2025
Updated:
03/21/2025

Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, execute arbitrary code, gain privileges, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability can be exploited to spoof user interface.
  2. Heap buffer overflow vulnerability in Skia can be exploited to cause denial of service.
  3. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  4. An elevation of privilege vulnerability in Extensions Google Chrome can be exploited remotely to gain privileges.
  5. Heap buffer overflow vulnerability in Google Chrome can be exploited to cause denial of service.
  6. Heap buffer overflow vulnerability in Tracing Google Chrome can be exploited to cause denial of service.
  7. Information disclosure vulnerability in Fenced Frames Google Chrome can be exploited to obtain sensitive information.
  8. An elevation of privilege vulnerability in Navigation Google Chrome can be exploited remotely to gain privileges.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2025-0439
    high
  • CVE-2025-0435
    high
  • CVE-2025-0436
    critical
  • CVE-2025-0434
    critical
  • CVE-2025-0443
    critical
  • CVE-2025-0437
    critical
  • CVE-2025-0440
    high
  • CVE-2025-0448
    unknown
  • CVE-2025-0438
    critical
  • CVE-2025-0441
    high
  • CVE-2025-0447
    critical
  • CVE-2025-0446
    warning
  • CVE-2025-0442
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.