CVE Alert: CVE-2025-10585 – Google – Chrome

CVE-2025-10585

UnknownExploitation active

Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVSS v3.1 not provided
Vendor
Google
Product
Chrome
Versions
140.0.7339.185 lt 140.0.7339.185
CWE
CWE-843, Type Confusion
Vector
n a
Published
2025-09-24T16:17:11.576Z
Updated
2025-09-24T16:54:34.898Z

AI Summary Analysis

Risk verdict

High risk with active exploitation; treat as priority 1 due to current exploitation state.

Why this matters

Remote code execution via a type confusion in V8 could allow full compromise of affected devices when users load a crafted HTML page. Given the “total” technical impact, the attacker could take control, steal data, or pivot within the network, especially on widely deployed Chrome endpoints.

Most likely attack path

An attacker hosts a crafted HTML page that exploits the vulnerability when loaded in the browser. No automation is required for exploitation, but user interaction (visiting the page) is typically involved; successful exploitation yields full device compromise through heap corruption. In environments with unpatched Chrome, attackers can weaponise drive-by or spear-phishing delivery to reach endpoints.

Who is most exposed

End-user and enterprise desktops/laptops running Chrome on Windows and macOS, particularly where patching is slow or devices are managed with delayed updates. Organisations with broad, uncontrolled Chrome deployments or remote workers are at heightened risk.

Detection ideas

  • Frequent Chrome crashes with heap-related signals or memory corruption dumps.
  • Unusual or repeated exploit-usage payloads triggering V8 errors.
  • HTTP(S) pages or sessions showing abnormal redirections to attacker-controlled hosts from within Chrome.
  • Anomalous process trees or privilege escalation indicators around Chrome.

Mitigation and prioritisation

  • Patch Chrome to the latest stable release immediately; enforce automatic updates.
  • Validate and accelerate deployment of patched builds via standard change-management processes.
  • Enable enhanced sandboxing, restrict untrusted HTML execution in corporate networks, and use EDR/NGAV detections for memory-corruption indicators.
  • Consider tightening web-page filtering and monitoring for drive-by risk; ensure SOC is aware of active exploitation and triage accordingly. Treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.