• Source:JND

After a critical vulnerability in Chrome was discovered to be actively exploited, Google quickly responded with an emergency patch for their browser. Hackers are actively targeting the flaw: CVE-2025-5419, which affects the V8 engine of Chrome. Even after Google issued a fix, they have been blamed for not being clear with users after a lapse in security disclosure.

What is CVE-2025-5419?

- Out-of-bounds read and write in the V8 JavaScript engine
- Allows a third party to perform unauthorised access to critical information through hacking.

Even though the flaw has been rated “high” due to its extreme danger level in real-world applications, it still allows hackers to conduct identity theft or other extreme cyber-attacks on people.

Google’s Silent Mitigation Raises Eyebrows

This will prompt questions regarding Google’s opaque structure whenever alerts pertaining to user safety are enabled.
Instead of warning and patching, Google rationed off some permissions for users on May 28 without notifying anyone. The shift was implemented through a remote configuration change under a server, which Google advanced after issuing official fixes.

ALSO READ: Google Settles Shareholder Lawsuit With $500 Million

U.S. Government Reacts Swiftly

The issue with CVE-2025-5419 drew the focus of U.S. cybersecurity agencies:

- Federal agencies were instructed either to update their Chrome or stop using it by Thursday.

- The Cybersecurity and Infrastructure Security Agency (CISA) may enforce a 21 day update window on federal systems.

The above scenarios depict a unique level of significance for the government which highlights the fact that this is not a standard update.

Another Dangerous Bug - CVE-2025 5068

Alongside CVE-2025-5419, the emergency update also targets other loopholes:

CVE-2025-5068: A use-after-free vulnerability in Chrome's Blink render engine

An external security researcher brought it to light.

The risk posed is threatening as they can potentially grant an attacker the ability to perform commands beyond the bounds of freed memory references.

The growing Spvern Chrome’s lack of internal security cconthotnd safeguards highlights this second flaw.

ALSO READ: Samsung Is Not Ready To Launch Its Galaxy Ring 2 Yet: Development In Progress

What You Should Do Now?

In order to update the device, chrome needs to be restarted immediately. The procedure users need to take is:

- Chrome downloads updates in the background but applies them only on restart.

- Default tabs will reopen automatically.

Incognito tabs will not; therefore, make sure to save all work prior to restarting.

To verify the version in use navigate through the browser: Settings > About Chrome

After applying the update, ensure that the latest version is titled on the device.

Users need to take action right away and restart Chrome to remain safe, as there are two security flaws that have recently been patched. The lack of prompt communication and mitigation on Google's side has brought up deeper issues of trust and transparency in browser security. Remain cautious, dangers are always present, ensure you update Chrome, and stay alert for security updates related to the browser.