Out of Bounds Memory Access in Google Chrome for Mac
CVE-2025-14174

8.8HIGH

Key Information:

Vendor

Google

Status
Vendor
CVE Published:
12 December 2025

Badges

📈 Score: 427💰 Ransomware👾 Exploit Exists🟡 Public PoC🦅 CISA Reported📰 News Worthy

What is CVE-2025-14174?

CVE-2025-14174 is a high-severity vulnerability affecting Google Chrome for Mac, specifically in the ANGLE component. This issue arises from out-of-bounds memory access, which can be triggered when a user interacts with a specially crafted HTML page. Google Chrome, a widely used web browser, serves as a platform for accessing web applications and content. The vulnerability poses a serious risk as it potentially allows remote attackers to manipulate memory beyond intended boundaries, which could lead to unauthorized access, data corruption, or even full system compromise.

Given the popularity of Google Chrome, the impact of this vulnerability is significant, as it can affect numerous organizations relying on the browser for business operations, online transactions, or sensitive communications. If exploited, CVE-2025-14174 can result in severe disruptions, exposing critical data and enabling further exploitation of connected systems.

Potential Impact of CVE-2025-14174

  1. Data Breaches: Exploitations of this vulnerability could lead to unauthorized access to sensitive information, including personal data, financial records, or proprietary business information, greatly compromising organizational security.

  2. System Compromise: Attackers may gain the ability to execute arbitrary code on affected systems, enabling them to take control of the compromised environment. This can facilitate further attacks within the organization, such as lateral movement or installation of malware.

  3. Reputation Damage: Successful exploitation of this vulnerability could result in public disclosures of data breaches, leading to reputational harm and eroded trust from clients and stakeholders, which may have lasting implications for the organization’s operations and market position.

CISA has reported CVE-2025-14174

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-14174 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Chrome 143.0.7499.110

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVE-2026-20700: Apple Patches Zero-Day Exploited in Sophisticated Cyber Attacks | SOC Prime

Dive into details for CVE-2026-20700, an Apple zero-day leading to RCE, with analysis on the SOC Prime blog.

2 weeks ago

Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700) - Help Net Security

Apple has released fixes for a zero-day vulnerability (CVE-2026-20700) that was exploited in targeted attacks last year.

2 weeks ago

Apple fixed first actively exploited zero-day in 2026

Apple fixed an exploited zero-day in iOS, macOS, and other devices that allowed attackers to run code via a memory flaw.

2 weeks ago

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • 📰

    First article discovered by BleepingComputer

  • Vulnerability published

  • Vulnerability Reserved

.