The Indian Computer Emergency Response Team (CERT-In) has issued a high-level warning on a remote code execution vulnerability in Google Chrome for desktop PCs. The issue enables an attacker to execute arbitrary code on a user's machine, potentially resulting in full system compromise or service interruption. The issue effects Google Chrome 141.0.7390.122/.123 and older versions on Windows and macOS, and Google Chrome 141.0.7390.122 and older on Linux machines. The business has released a remedy with its most recent stable Google Chrome versions.
CERT-In urges Google Chrome users to update to the latest version
In a new vulnerability alert (CIVN-2025-0274) published on October 22, CERT-In cautions users about a remote code execution weakness that affects unpatched versions of Google Chrome for desktop. The vulnerability allows attackers to execute code on a user's machine, potentially resulting in a complete system takeover or service interruption. Chrome versions prior to 141.0.7390.122/.123 on Windows and macOS, and 141.0.7390.122 on Linux, are impacted.
According to the alert, the problem stems from an incorrect implementation in Chrome's V8 engine, a crucial component responsible for processing JavaScript code. A remote attacker might exploit this vulnerability by submitting specially crafted web requests that cause unexpected program behavior.
If properly exploited, the vulnerability might allow an attacker to run arbitrary code with the same rights as the logged-in user, leading to a total system takeover, data theft, or interruption of critical services.
CERT-In has encouraged all end users and businesses to update to the most recent version of Chrome as soon as possible to limit their vulnerability to future threats. Google stated that the patch is part of the Stable Channel Update for Desktop, which will be issued on October 21, 2025 and will be phased in over the next few days and weeks. The latest build versions are 141.0.7390.122/.123 for Windows and macOS, and 141.0.7390.122 for Linux.
Users may manually check for updates by going to Help > About Google Chrome in their browser settings. To defend against growing security concerns, CERT-In recommends deploying updates as soon as possible and activating automated updates. The organization also recommends checking official Chrome security advisories for future fixes that address similar high-risk vulnerabilities.
#certin #googlechrome #newstainmentora

.png)