Kaspersky ID:
KLA89786
Detect Date:
10/30/2025
Updated:
11/04/2025

Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Type Confusion vulnerability in V8 can be exploited to cause denial of service.
  2. Inappropriate implementation vulnerability in V8 can be exploited to cause denial of service.
  3. Object lifecycle vulnerability in Media can be exploited to cause denial of service or spoof user interface.
  4. Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.
  5. Race condition vulnerability in V8 can be exploited to cause denial of service.
  6. Race condition vulnerability in Storage can be exploited to cause denial of service.
  7. Incorrect security UI vulnerability in Omnibox can be exploited to spoof user interface.
  8. Policy bypass vulnerability in Extensions can be exploited to bypass security restrictions.
  9. Use after free vulnerability in PageInfo can be exploited to cause denial of service or execute arbitrary code.
  10. Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.
  11. Inappropriate implementation vulnerability in App-Bound Encryption can be exploited to cause denial of service.
  12. Inappropriate implementation vulnerability in Autofill can be exploited to cause denial of service.
  13. Out of bounds read vulnerability in V8 can be exploited to cause denial of service.
  14. Out of bounds read vulnerability in WebXR can be exploited to cause denial of service.
  15. Incorrect security UI vulnerability in Fullscreen UI can be exploited to spoof user interface.
  16. Incorrect security UI vulnerability in SplitView can be exploited to spoof user interface.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2025-12428
    unknown
  • CVE-2025-12429
    unknown
  • CVE-2025-12430
    unknown
  • CVE-2025-12431
    unknown
  • CVE-2025-12432
    unknown
  • CVE-2025-12433
    unknown
  • CVE-2025-12434
    unknown
  • CVE-2025-12435
    unknown
  • CVE-2025-12436
    unknown
  • CVE-2025-12437
    unknown
  • CVE-2025-12438
    unknown
  • CVE-2025-12439
    unknown
  • CVE-2025-12440
    unknown
  • CVE-2025-12441
    unknown
  • CVE-2025-12443
    unknown
  • CVE-2025-12444
    unknown
  • CVE-2025-12445
    unknown
  • CVE-2025-12446
    unknown
  • CVE-2025-12447
    unknown

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.