CVE-2025-0437
Published: 15 January 2025
Summary
CVE-2025-0437 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 20.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of system flaws, directly addressing this out-of-bounds read vulnerability through Chrome patching to version 132.0.6834.83 or later.
Implements memory protection mechanisms that mitigate heap corruption and unauthorized code execution from out-of-bounds reads in the Chrome Metrics component.
Enables vulnerability scanning to identify systems running vulnerable Google Chrome versions affected by CVE-2025-0437.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct browser client-side out-of-bounds read via crafted HTML enables drive-by compromise (T1189) and exploitation for client execution (T1203).
NVD Description
Out of bounds read in Metrics in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Deeper analysisAI
CVE-2025-0437 is an out-of-bounds read vulnerability (CWE-125) in the Metrics component of Google Chrome prior to version 132.0.6834.83. This flaw, classified as High severity by Chromium security standards, enables a remote attacker to potentially trigger heap corruption by processing a crafted HTML page.
The vulnerability can be exploited by a remote attacker with network access, requiring low attack complexity and no privileges, but user interaction such as visiting a malicious site. Exploitation could lead to high impacts on confidentiality, integrity, and availability, as reflected in its CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
Mitigation is available via the stable channel update for Chrome desktop, documented in the Chrome Releases blog at https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html and the Chromium issue tracker at https://issues.chromium.org/issues/378623799. Affected systems should be updated to Chrome 132.0.6834.83 or later.
Details
- CWE(s)