Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Information:
Google Chrome is a free, fast, and secure web browser developed by Google for accessing the internet and web-based applications on various devices, including desktop computers, smartphones, and tablets. Chrome currently has a large number of users.
Incident:
Google has released an urgent security update for its Chrome browser to address two security flaws, including one critical vulnerability that is currently being actively exploited in the wild.
The flaw is identified as CVE-2025-13223 (CVSS score: 8.8), which is a Type Confusion vulnerability in the V8 JavaScript and WebAssembly engine.
The vulnerability could allow a remote attacker to exploit heap corruption via a crafted HTML page, potentially leading to arbitrary code execution or program crashes. The flaw was discovered and reported by Google’s Threat Analysis Group (TAG) on November 12, 2025.
Google confirmed that an "exploit for CVE-2025-13223 exists in the wild." This marks the seventh actively exploited zero-day flaw patched in Chrome since the beginning of the year.
Recommendation:
Users are strongly advised to update their Chrome browser immediately to versions 142.0.7444.175/.176 (for Windows), 142.0.7444.176 (for Apple macOS), and 142.0.7444.175 (for Linux).Users of other Chromium-based browsers (such as Microsoft Edge, Brave, Opera, and Vivaldi) should also apply the corresponding fixes as they become available.
The important things is Security systems. We must concern and monitor as usual.
For more information please contact
Email :sales@inetms.co.th
065 149 2822 (Ms.Suphatson )
063 204 4534 (Ms.Atsamaphorn)
065 929 6330 (Ms.Kansinee)
061 387 9439 (Ms.Sirilak)
092 257 6902 (Ms.Narusorn)
063 197 7510 (Mr.Yanotai)
065 725 7405 (Ms.Nattharini)
References:
-https://thehackernews.com/2025/11/google-issues-security-fix-for-actively.html
Weekly Interesting CVE
| NO. |
CVE Name |
Published Date |
Last Update |
Device/Appplication/OS Target |
Attack Type |
CVSS |
Detail |
Solution |
Reference |
|---|---|---|---|---|---|---|---|---|---|
| 1 |
CVE-2025-64446 |
14/11/2025 |
15/11/2025 |
Fortinet 8.0.0 through 8.0.1, 7.6.0 through 7.6.4, 7.0.0 through 7.0.11 |
Path traversal |
9.1 |
A relative path traversal vulnerability in Fortinet FortiWeb may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests. |
Upgrade to 8.0.2, Upgrade to 7.2.12, |
|
| 2 |
CVE-2025-21042 |
12/9/2025 |
12/11/2025 |
Samsung Galaxy |
Out-of-bounds write |
8.8 |
A critical vulnerability affecting Samsung Galaxy mobile devices (including S22, S23, S24 series, and certain Z Fold/Flip models). It was actively exploited as a zero-day to deploy spyware. |
Update to the SMR April 2025 security patch for Android 13/14/15. |
|
| 3 |
CVE-2025-64109 |
5/11/2025 |
6/11/2025 |
Cursor CLI Beta |
Os command injection |
8.8 |
The vulnerability lies in the handling of the Model Context Protocol (MCP) server configuration file, .cursor/mcp.json, within a cloned repository. The application fails to properly neutralize special elements used in OS commands. |
Update to version 2025.09.17‑25b418f or later. |
https://app.opencve.io/cve/CVE-2025-64109
|
| 4 |
CVE-2025-13306 |
17/11/2025 |
17/11/2025 |
D-Link DWR-M920, DWR-M921, DIR-822K and DIR-825M 1.1.5 |
Command Injection |
6.3 |
The affected component is the system function within the file /boafrm/formDebugDiagnosticRun. Manipulating the host argument can lead to Command Injection, which can be exploited remotely. |
It has not been fixed yet. |
|
| 5 |
CVE-2025-65073 |
17/11/2025 |
17/11/2025 |
OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 |
Authentication Bypass |
7.5 |
There is a vulnerability that allows a /v3/ec2tokens or /v3/s3tokens request with a valid AWS Signature to be used to obtain authorization from Keystone. |
Update Keystone to a fixed version: |
https://www.openwall.com/lists/oss-security/2025/11/17/6 |
Malware News or Campaign IOC/IOA | EN
|
No |
Campaign Name |
Detection Date |
Attack Type |
Description |
Mitigation/Remediation |
|---|---|---|---|---|---|
| 1 |
New EDR-Freeze tool uses Windows WER to suspend security software |
22/09/2025 |
Defense evasion |
Palo Alto Networks’ Unit 42 discovered a sophisticated Android spyware called Landfall, which exploits a previously unknown (“zero-day”) vulnerability in Samsung’s image processing library (libimagecodec.quram.so). The CVE is CVE-2025-21042. SC Media+2Purple Ops+2The campaign has been active from mid-2024 (around July) and continued until early 2025, before Samsung issued a patch in April 2025. TechCrunch+1Attack vector: malicious .DNG (Digital Negative) image files sent over WhatsApp. These images contain a hidden ZIP archive with the spyware. When the image is processed, the exploit runs automatically. |
|
Ref:https://www.scworld.com/brief/novel-landfall-android-spyware-exploits-samsung-zero-day
25 November 2025
Viewed 215 time