
🔍 Overview
In a recent development that has sent ripples through the cybersecurity world, the Indian Computer Emergency Response Team (CERT-In) has issued a high-severity alert for users of Google Chrome on desktop platforms. The warning stems from multiple critical vulnerabilities that, if left unpatched, could allow remote attackers to compromise systems, steal data, and install malicious software.
🚨 What Happened?
CERT-In has highlighted two major vulnerabilities in the Chrome browser, including an actively exploited zero-day vulnerability. These flaws, found in components such as Chrome's Mojo and Loader systems, enable attackers to execute arbitrary code by simply luring users to visit specially crafted malicious websites.
One of the vulnerabilities, CVE-2025-4664, has been marked particularly dangerous due to active exploitation in the wild. It involves improper input validation in the Mojo component that can lead to unauthorised control over the affected system.
💻 Who Is Affected?
These vulnerabilities affect users running outdated versions of Chrome on major desktop operating systems:
- Windows & macOS: Versions earlier than 136.0.7103.113/.114
- Linux: Versions earlier than 136.0.7103.113
Mobile Chrome users are currently not impacted by these specific vulnerabilities.
🔒 What’s at Risk?
If exploited, these flaws could result in:
- Remote Code Execution: Hackers can run malicious code on your device.
- Data Theft: Sensitive personal and business data may be accessed or leaked.
- Malware Infections: Your system could be infected with spyware or ransomware.
- System Disruption: Potential for Denial-of-Service (DoS) attacks and complete system hijack.
✅ What Should You Do?
CERT-In has issued the following urgent recommendations:
1) Update Your Browser Immediately
2) Go to chrome://settings/help and ensure you're using:
- Windows/macOS: Version 136.0.7103.113 or later
- Linux: Version 136.0.7103.113
Restart Chrome After Updating
Updates won’t take effect until the browser is restarted.
Avoid Unknown Links
Don’t click on suspicious URLs or email attachments that could redirect you to exploit-laden websites.
🛡️ Final Thoughts
This incident highlights how even the most widely used and trusted software platforms are not immune to vulnerabilities. With cyber threats growing more sophisticated, often exploiting zero-day flaws, it’s more important than ever to stay updated and aware.
Don't wait for an attack; protect your data by staying patched and alert.
📚 Sources & References
June 1, 2025
