CVE-2025-0762
Published: 29 January 2025
Summary
CVE-2025-0762 is a high-severity Use After Free (CWE-416) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 41.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-11 (User-installed Software) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the use-after-free vulnerability by requiring timely remediation through patching Chrome to version 132.0.6834.159 or later.
Prevents exploitation by enforcing organizational controls on user-installed software, blocking or monitoring installation of crafted malicious Chrome Extensions.
Implements memory safeguards such as address space layout randomization or data execution prevention to mitigate heap corruption from use-after-free in DevTools.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
UAF in Chrome DevTools enables RCE via crafted malicious extension (client-side exploitation).
NVD Description
Use after free in DevTools in Google Chrome prior to 132.0.6834.159 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)
Deeper analysisAI
CVE-2025-0762 is a use-after-free vulnerability (CWE-416) in the DevTools component of Google Chrome prior to version 132.0.6834.159. This flaw allows a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. The issue carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is rated Medium severity by Chromium security.
A remote attacker with no privileges can exploit this vulnerability by convincing a user to interact with a maliciously crafted Chrome Extension, such as through installation or usage triggered by a webpage. Successful exploitation could result in heap corruption, enabling high-impact compromise of confidentiality, integrity, and availability, potentially leading to arbitrary code execution within the browser context.
Google has mitigated this vulnerability in Chrome stable channel version 132.0.6834.159. Security practitioners should advise users to update immediately to this version or later. Additional details are available in the Chrome Releases announcement at https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_28.html and the Chromium issue tracker at https://issues.chromium.org/issues/384844003.
Details
- CWE(s)