Zero-day in Chrome: once again the browser is in the crosshairs, and the response is an immediate patch.

In mid-September, Google rolled out an emergency update for Chrome following the discovery of a high-profile vulnerability in the V8 JavaScript and WebAssembly engine, classified as CVE-2025-10585.

It’s a type confusion flaw that, in the right hands, allows corruption of the browser’s memory and potentially the execution of arbitrary code on the victim’s machine. Google has confirmed there’s an exploit in the wild, which is why the patch cannot be delayed.

Why V8 matters: from the heart of the browser to the risk of a sandbox escape.

The fact that the bug involves V8 is not a minor detail: V8 is the engine Chrome uses to run JavaScript and WebAssembly, and compromising it opens the door to sandbox-escape scenarios—that is, the possibility for an attacker to bypass the protections that should confine malicious code within the browser. This is why Google opted to ship the stable release immediately and has temporarily limited access to the exploit’s technical details, a now-established practice to reduce the window of abuse until a significant portion of users have updated.

The worrying trend: Chrome’s sixth zero-day of 2025.

What should worry CISOs is not just the technical nature of the flaw, but the trend it underscores. CVE-2025-10585 is in fact the sixth Chrome zero-day to surface and be fixed in 2025—a sign of sustained pressure from actors who research and exploit vulnerabilities in the world’s most widely used software. The frequency with which real-world exploits against Chrome emerge highlights how the browser is no longer just a productivity tool, but also a primary vector for initial intrusion.

What to do? Update immediately. Organizations must ensure that automatic update policies are enabled, verify the versions installed on managed devices, and orchestrate a rapid patching campaign for the most critical systems. For environments with heterogeneous assets or dependencies that require pre-deployment validation, a risk assessment (asset criticality, exposure, presence of remote work) will help determine the update order; but delaying a large-scale rollout carries real risk, because Google has explicitly stated it is aware of active exploits.

Multi-layer defense: hardening, monitoring, isolation.

On a strategic level, the recurrence of zero-days in core components like V8 surfaces two takeaways. First, the traditional split between “perimeter defense” and “endpoint” is no longer sufficient: a company can have excellent firewalls and email filters and still be vulnerable if users’ browsers are compromised. Second, mitigation must be multi-layered: prompt patching, browser hardening (policies that limit extensions and unnecessary features), monitoring of suspicious activity, and—where possible—browser isolation for high-risk sessions. EDR/EDR-equivalent tools that correlate browser-process anomalies with abnormal system-level activity remain essential for detecting exploits that make it past the first barrier.

Processes and coordination: playbooks and rollout via MDM.

Finally, the organizational component must not be underestimated: an effective response to a zero-day requires up-to-date playbooks, clear internal communications, and—for large organizations—the ability to coordinate rollouts via MDM/CMDB to reduce time-to-patch. In the meantime, companies should consider introducing or expanding proactive controls such as browser isolation for high-risk users and centralized extension management. The events of these weeks are a reminder: in an ecosystem where attack surfaces evolve rapidly, resilience does not come from a single patch, but from the processes and defenses that support it.

Google has made the fixed builds available and is limiting the disclosure of details until the update has been deployed. For security teams, the priority is clear: verify the status of browsers across the organization and apply the update immediately, because when an exploit is “in the wild,” time is not on our side.

Alex Semenzato

Alex Semenzato

Security Architect

Iscriviti alla newsletter