New Report Alert: Top Ransomware Attacks of 2025. Being Prepared for 2026

CVE-2025-6558

Actively Exploited Chrome Zero-Day via ANGLE GPU Input Validation Flaw: Analyzing CVE-2025-6558

Vulnerability Overview 

CVE ID: CVE-2025-6558 

CVE Title: Google Chrome: Remote Sandbox Escape via Improper Input Validation in ANGLE and GPU Components 

Severity: High 

Exploit Status: Actively Exploited in the Wild 

Business Risk: High. This vulnerability lets remote attackers escape the browser sandbox and gain system access via crafted HTML, risking full endpoint compromise. 

Compliance Impact: Possible non-compliance with NIST 800-53, ISO 27001, and CISA BOD 22-01 due to delayed response to a known exploited vulnerability.

CVE-2025-6558 is a serious bug in Google Chrome’s ANGLE and GPU parts, caused by improper input checks. Found by Google’s Threat Analysis Group, it lets attackers break out of the browser’s sandbox and possibly access the system if a user visits a harmful website. It affects Chrome versions before 138.0.7204.157 and is already being used in real attacks. CISA has listed it as a known threat, with a patch deadline for federal agencies by August 12, 2025.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-6558?

Technical Overview

How Does the CVE‑2025‑6558 Exploit Work?

The attack typically follows these steps:

How Does the CVE‑2025‑6558 Exploit Work? 

What Causes CVE‑2025‑6558?

Vulnerability Root Cause:  

This vulnerability happens because Chrome’s ANGLE and GPU components don’t properly check untrusted input. Visiting a malicious page can let attackers bypass the browser’s sandbox and access the system.

How Can You Mitigate CVE‑2025‑6558?

If immediate patching is delayed or not possible:  

  • Avoid visiting unknown or untrusted websites that might have harmful GPU content targeting Chrome. 
  • Limit Chromium-based browser use to trusted users and networks with access controls. 
  • Watch browser logs and network traffic for unusual GPU-related activity or suspicious browsing. 
  • Use security tools like Web Application Firewalls to block suspicious pages with harmful GPU commands. 
  • Keep browsers updated regularly and consider automating updates to reduce risk.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE‑2025‑6558 Cause Downtime?

Patch application impact: Updating Chrome to fix CVE-2025-6558 usually takes less than a minute. It only requires restarting the browser. There is little to no downtime for users or systems.  

Mitigation (if immediate patching is not possible): If you can’t update immediately, avoid unknown websites and teach users to be careful with suspicious links. These steps lower the risk but don’t fully fix the problem.

How Can You Detect CVE‑2025‑6558 Exploitation?

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

CVSS Breakdown Table

MetricValue Description
Base Score8.8High severity with strong impact and relatively easy exploitation
Attack VectorNetworkExploitable remotely via web content
Attack ComplexityLowNo special conditions or pre-setup required
Privileges RequiredNoneNo attacker privileges needed
User Interaction RequiredVictim must visit a crafted HTML page
Scope Unchanged Impact remains within the same privilege level
Confidentiality Impact HighCan expose sensitive data by escaping sandbox
Integrity ImpactHighAllows modification or injection of content/code
Availability ImpactHighMay lead to denial of service or stability issues

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.