Summary
CVE-2025-10585 is a high-severity Chrome zero-day in the V8 engine, allowing attackers to run code via malicious webpages. Reported by Google TAG on September 16, 2025, it is actively exploited. Affected versions: Chrome before 140.0.7339.185 (Linux) and 140.0.7339.185/.186 (Windows/macOS).
Urgent Actions Required
- Update Chrome to 140.0.7339.185/.186 (Windows/macOS) or 140.0.7339.185 (Linux) immediately.
- Patch Chromium-based browsers (Edge, Brave, Opera, Vivaldi) when updates arrive.
- Manually check for updates via Help > About Chrome.
- Use extra browser or network protections until all systems are updated.
Which Systems Are Vulnerable to CVE-2025-10585?
Technical Overview
- Vulnerability Type: Type Confusion in V8 JavaScript and WebAssembly Engine.
- Affected Software/Versions:
- Google Chrome prior to 140.0.7339.185 on Linux
- Google Chrome prior to 140.0.7339.185/.186 on Windows and macOS
- Attack Vector: Network (via malicious or compromised webpage)
- CVSS Score: 9.8
- CVSS Vector: CVSS:3.0
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Patch Availability: Yes, available [1] [2]
How Does the CVE-2025-10585 Exploit Work?
The attack typically follows these steps:
What Causes CVE-2025-10585?
Vulnerability Root Cause:
CVE-2025-10585 is a flaw in Chrome’s V8 engine that misreads JavaScript, allowing attackers to run code, bypass the sandbox, and compromise the system.
How Can You Mitigate CVE-2025-10585?
If immediate patching is delayed or not possible:
- Avoid untrusted websites with potentially malicious scripts.
- Use browser settings or extensions to block unknown scripts.
- Watch for unusual browser activity or logs.
- Update Chrome immediately to 140.0.7339.185/.186 (Windows/macOS) or 140.0.7339.185 (Linux).
Which Assets and Systems Are at Risk?
Asset Types Affected:
- Browsers at Risk: Google Chrome prior to 140.0.7339.185/.186 on Windows/macOS and prior to 140.0.7339.185 on Linux.
Business-Critical Systems at Risk:
- Systems that rely on Chrome to access sensitive applications or corporate resources.
Exposure Level:
- Exposed endpoints where users visit risky websites.
Will Patching CVE-2025-10585 Cause Downtime?
Patch application impact: Low. Update Chrome to 140.0.7339.185/.186 (Windows/macOS) or 140.0.7339.185 (Linux) and restart—minimal disruption required.
Remediation & Response
Patch/Upgrade Instructions:
- Update Google Chrome to version 140.0.7339.185/.186 on Windows/macOS or 140.0.7339.185 on Linux[1]
Mitigation Steps if No Patch:
- Avoid visiting untrusted or potentially compromised websites.
- Implement endpoint monitoring to detect abnormal Chrome behavior or crashes.
- Limit execution of untrusted scripts where possible through security settings or browser policies.
Remediation Timeline:
- Immediate (0–2 hrs): Begin rollout of Chrome update to all users.
- Within 8 hrs: Ensure all critical endpoints are updated to the patched version.
- Within 24 hrs: Confirm no systems are running vulnerable Chrome versions.
Rollback Plan:
If the update causes issues, revert to the last stable Chrome release while maintaining heightened monitoring for signs of compromise.
Incident Response Considerations:
- Isolate affected systems showing unexpected crashes or potential exploitation signs.
- Collect logs from endpoint monitoring tools and browser crash reports for forensic analysis.
- Verify whether any arbitrary code execution occurred and identify impacted processes.
- Monitor the browser and system after patching to confirm the issue is resolved.
Where Can I Find More Information on CVE-2025-10585?
CVSS Breakdown Table
| Metric | Value | Description |
|---|---|---|
| Base Score | 9.8 | Critical severity, reflecting active exploitation and high potential impact |
| Attack Vector | Network | Exploitable remotely via malicious web content (HTTP/HTTPS) |
| Attack Complexity | Low | No special conditions needed; simply visiting a crafted webpage can trigger exploitation |
| Privileges Required | None | No authentication or elevated privileges required to exploit |
| User Interaction | None | Exploitation occurs when a user visits a malicious page; no further action needed |
| Scope | UnChanged | Impacts only the Chrome V8 engine component itself |
| Confidentiality Impact | High | Exploit could allow access to sensitive data within the browser context |
| Integrity Impact | High | Exploit could allow arbitrary code execution and manipulation of browser memory |
| Availability Impact | High | Exploit can crash the browser and disrupt normal use, affecting system availability |