CVE-2025-14174 is a high-severity OOB memory access vulnerability in Chromium browsers being actively exploited. Update Chrome and Edge immediately.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| chrome | 143.0.7499.41 | 143.0.7499.110 | vulnerable |
| macos | - | - | unaffected |
| chrome | 143.0.7499.40 | 143.0.7499.109 | vulnerable |
| linux_kernel | - | - | unaffected |
| windows | - | - | unaffected |
| chrome | * | 143.0.7499.40 | vulnerable |
| safari | * | 26.2 | vulnerable |
| ipados | * | 18.7.3 | vulnerable |
| ipados | 26.0 | 26.2 | vulnerable |
| iphone_os | * | 18.7.3 | vulnerable |
| iphone_os | 26.0 | 26.2 | vulnerable |
| macos | * | 26.2 | vulnerable |
| tvos | * | 26.2 | vulnerable |
| visionos | * | 26.2 | vulnerable |
| watchos | * | 26.2 | vulnerable |
| edge_chromium | * | 143.0.3650.80 | vulnerable |
Immediately update Google Chrome, Microsoft Edge, and Apple Safari to the latest security releases. Google and Microsoft have released specific stable channel updates to address this memory corruption flaw in the ANGLE component.
Ensure Google Chrome is updated to version 143.0.7499.110 or later and Microsoft Edge is updated to version 143.0.3650.80 or later. For Apple users, update macOS, iOS, and iPadOS to the latest versions to patch integrated web components.
Deploy web filtering and secure web gateways to block access to untrusted or known malicious domains. Since the attack vector requires user interaction with a crafted HTML page, reducing exposure to unverified sites mitigates the risk of exploitation.
Configure Endpoint Detection and Response (EDR) tools to alert on frequent browser renderer process crashes or unusual memory allocation patterns. Monitor for suspicious child processes being spawned by browser executables, which may indicate a successful OOB access exploit.
Detection should focus on identifying browser instability and crashes related to the ANGLE engine or GPU process. Security teams should analyze EDR telemetry for anomalous memory access patterns originating from chrome.exe, msedge.exe, or Safari processes. Additionally, review web proxy and firewall logs for traffic to suspicious domains immediately preceding browser crashes, as this vulnerability is triggered via network-delivered malicious HTML content.
Experience superior visibility and a simpler approach to cyber risk management