Tuesday, March 17, 2026

Critical Chrome Vulnerability Allow Attackers to Control Memory and Run Arbitrary Code

Google has released a critical security update for Chrome, addressing multiple high-severity vulnerability that could allow attackers to manipulate system memory and potentially execute arbitrary code.

The update, version 138.0.7204.183/.184 for Windows and Mac, and 138.0.7204.183 for Linux, includes four security fixes and is being rolled out globally over the coming days and weeks.

The most significant vulnerability addressed in this update is CVE-2025-8292, a high-severity “use after free” bug in Chrome’s Media Stream functionality.

This type of vulnerability occurs when the browser attempts to access memory that has already been freed, creating a dangerous condition that attackers can exploit to corrupt memory and potentially execute malicious code on affected systems.

The vulnerability was discovered and reported by an anonymous security researcher on June 19, 2025, highlighting the ongoing collaborative effort between the security community and Google’s Chrome team.

Use after free vulnerabilities are particularly concerning because they can lead to complete system compromise, allowing attackers to bypass security controls and gain unauthorized access to sensitive data or system resources.

This specific vulnerability affects Chrome’s media streaming capabilities, which are increasingly important as web applications handle more multimedia content.

The timing of this discovery is critical, as media streaming features are heavily utilized across various web platforms and applications.

Chrome Vulnerability

Google awarded the anonymous researcher $8,000 for discovering CVE-2025-8292, demonstrating the company’s commitment to incentivizing security research through its bug bounty program.

This substantial reward reflects the severity of the vulnerability and the potential impact it could have had on Chrome users worldwide.

The bug bounty program continues to be a cornerstone of Chrome’s security strategy, encouraging external researchers to identify and report vulnerabilities before they can be exploited maliciously.

Google has maintained restrictions on bug details and links until a majority of users receive the security update, following industry best practices for responsible disclosure.

Additionally, the update includes various fixes from internal audits, fuzzing, and other security initiatives, tracked under issue 434760450.

This comprehensive approach combines external security research with Google’s internal security teams to create multiple layers of protection for Chrome users.

Advanced Detection Tools

Google’s security team employed sophisticated detection tools to identify and prevent additional vulnerabilities from reaching the stable channel.

Users are strongly encouraged to update their Chrome browsers immediately to protect against these vulnerabilities. The update will be distributed automatically through Chrome’s built-in update mechanism, ensuring broad protection across Google’s user base.

The company utilizes AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL to automatically detect memory corruption issues and other security vulnerability during the development process.

These automated security tools represent state-of-the-art approaches to vulnerability detection, allowing Google to identify potential security issues before they affect end users.

The combination of static analysis, dynamic testing, and fuzzing techniques creates a comprehensive security testing framework that continuously monitors Chrome’s codebase for potential vulnerabilities.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks
Ethan Brooks
Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent News

Recent News