Cyber Posture

CVE-2025-1914

High

Published: 05 March 2025

Published
05 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0095 76.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in client applications to execute code.

Security Summary

CVE-2025-1914 is an out-of-bounds read vulnerability in the V8 JavaScript and WebAssembly engine within Google Chrome versions prior to 134.0.6998.35. The flaw, classified under CWE-125 (Out-of-bounds Read), enables a remote attacker to perform out-of-bounds memory access through a specially crafted HTML page. Google rates this as High severity in Chromium security, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), highlighting its potential for significant impact on confidentiality, integrity, and availability.

A remote attacker can exploit this vulnerability by tricking a user into visiting a malicious website or interacting with a crafted HTML page, requiring no privileges or special access. Successful exploitation grants high-level access to sensitive memory contents, potentially allowing arbitrary code execution, data leakage, or system crashes within the browser's sandboxed context.

Mitigation is addressed in the Chrome Stable Channel update, as detailed in the official release notes at https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html, which patches the issue in version 134.0.6998.35 and later. Additional technical details are available in the Chromium issue tracker at https://issues.chromium.org/issues/397731718. Security practitioners should prioritize updating affected Chrome installations to prevent exploitation.

Details

CWE(s)
CWE-125

Affected Products

google
chrome
≤ 134.0.6998.35

MITRE ATT&CK Enterprise Techniques

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Vulnerability in Chrome V8 enables exploitation via malicious website/HTML page visit, directly mapping to drive-by compromise for initial access and client application exploitation for code execution/memory access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References