#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

33 C
Dubai
Thursday, September 11, 2025
HomeTopics 4PatchChrome Stable Update 136.0.7103.113/.114 Patches Critical Exploited Vulnerability CVE-2025-4664

Chrome Stable Update 136.0.7103.113/.114 Patches Critical Exploited Vulnerability CVE-2025-4664

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

On May 14, 2025, Google rolled out a critical update to the Chrome Stable channel version 136.0.7103.113/.114 for Windows and macOS, and 136.0.7103.113 for Linux. While most users might see this as another routine browser update, cybersecurity professionals should take note: this release includes multiple security fixes, including a high-severity zero-day vulnerability (CVE-2025-4664) that has been exploited in the wild. This update is part of Google’s ongoing effort to secure its widely used web browser and shield users from increasingly sophisticated cyber threats.

This article dissects the technical specifics of the update, explains the importance of the patched vulnerabilities, particularly the exploited zero-day, and offers practical security recommendations for enterprise IT teams and end users alike.

The Importance of Chrome Version 136.0.7103.113/.114

This release marks an important security milestone as it addresses four critical vulnerabilities, two of which were disclosed by external security researchers. One of these CVE-2025-4664 has already been weaponized in the wild, raising urgency for immediate patch deployment across all endpoints.

Slonser noted in his X account:

A fix from Google was released today. Part of the issue was due to my misunderstanding based on previous reports. Big thanks to chromium team for the quick resolve I hope everyone had some fun, and apologies to the triagers on HackerOne XD

He also added:

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

Overview of Key Fixes

  1. CVE-2025-4664High severity – Insufficient policy enforcement in Loader
    • Reported by: @slonser_ via X on May 5, 2025
    • Impact: This vulnerability could allow malicious actors to bypass security policies enforced during resource loading, potentially enabling unauthorized code execution.
    • Status: Exploited in the wild. Google is restricting full technical details until a majority of users are updated.
  2. CVE-2025-4609High severity – Incorrect handle in Mojo
    • Reported by: Security researcher Micky on April 22, 2025
    • Impact: Mismanagement of system handles in the Mojo IPC framework could lead to crashes or privilege escalation under certain conditions.
    • Status: No evidence of active exploitation at time of release.
  3. Internal Fixes and Fuzzing Discoveries:
    • Google’s internal team has contributed numerous fixes discovered via advanced fuzzing tools and static analysis frameworks like AddressSanitizer, libFuzzer, and Control Flow Integrity modules.

Why CVE-2025-4664 Matters

Zero-day vulnerabilities those actively exploited before a patch is available pose immediate danger. CVE-2025-4664’s exploitation confirms that attackers are already leveraging this flaw in the wild. Although the technical details remain confidential to prevent further abuse, the vulnerability’s classification points to a severe flaw in Chrome’s internal resource loading mechanisms.

Historically, browser-based zero-days have been employed in:

  • Drive-by-download attacks via compromised websites
  • Phishing campaigns using malicious JavaScript payloads
  • Surveillance campaigns against high-value targets

Security professionals and administrators are urged to ensure their systems are updated immediately.

Broader Security Context

With Chrome being the most widely used browser globally—with more than 3.2 billion users across platforms—it remains a high-value target for cybercriminals. This reality drives Google’s continuous focus on browser hardening, employing techniques such as:

  • Bug bounty programs
  • Fuzz testing automation
  • Sandboxing of browser processes
  • Memory safety tools

The update aligns with Google’s best-in-class vulnerability response approach: patch fast, communicate responsibly, and reward researchers contributing to platform security.

Enterprise Implications

Organizations that delay browser updates expose themselves to significant risk, especially if employees use Chrome for email, document handling, or web-based internal tools. A single unpatched vulnerability could act as an entry point for advanced persistent threats (APTs), ransomware, or data exfiltration.

10 Tips to Avoid Security Risks from Browser Vulnerabilities

  1. Enable Automatic Updates: Ensure Chrome is configured to auto-update on all workstations.
  2. Centralize Patch Management: Use enterprise tools like Google Chrome Enterprise or GPOs to enforce update policies.
  3. Monitor CVE Feeds: Keep track of CVE announcements via NVD, MITRE, and vendors like Google.
  4. Deploy Application Sandboxing: Isolate browser activity using virtualization or containerization when dealing with untrusted sources.
  5. Implement Zero Trust Web Access: Limit what websites employees can access based on roles and risk.
  6. Train Staff on Phishing and Drive-by Threats: Human error remains the top vector for exploitation.
  7. Utilize Endpoint Detection and Response (EDR): Spot unusual Chrome behavior at the process level.
  8. Leverage Browser Security Extensions: Use vetted extensions for script-blocking, privacy enforcement, etc.
  9. Audit Permissions for Plugins and Extensions: Reduce the attack surface by removing unused or unnecessary tools.
  10. Engage in Bug Bounty Collaboration: Large organizations can consider their own incentivized testing programs.

Conclusion

The release of Chrome 136.0.7103.113/.114 is more than just another version increment it is a critical response to active cyber threats targeting everyday users and enterprises alike. With CVE-2025-4664 already exploited in the wild, the urgency to patch cannot be overstated. Organizations must remain vigilant, prioritize browser security updates, and adopt a layered security model that includes proactive monitoring, secure configuration, and continuous training.

For security teams, now is the time to assess browser hygiene across the enterprise and take immediate action. The speed of today’s cyber attackers leaves no room for delay.

Stay safe, stay updated.

Sources:

If you’d like a printable security bulletin version of this article for your IT team or clients, let me know!

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here