Google Chrome Zero-Day Campaign (Internal ID 466192044)

Targeted Sectors

·         General web users

·         likely targeted espionage operations against high-value targets (e.g., journalists, political dissidents).

Targeted Countries

·         Potentially Global

BLUF

Google has released an emergency patch for a high-severity, actively exploited zero-day vulnerability in the Chrome browser, potentially residing in the ANGLE engine library.

Date of First Reported Activity

·         December 10, 2025

Date of Last Reported Activity Update

·         December 11, 2025

CVEs and CVSS Vectors for 3.1

No CVE assigned yet (tracked by internal bug ID 466192044). Severity is rated as high.

CVES associated with Google Internal ID are

CVE-2025-14372

CVSS v3.1

(9.8) AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Nessus plugin ID

·         278157

Is this CVE on the KEV list?

·         No

CVE-2025-14373

CVSS v3.1

(4.3) AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Nessus plugin ID

•             278158

Is this CVE on the KEV list?

·         No

Also an unnamed CVE that is listed as high

Patching/Mitigation Data

Patch release date

·         December 10-11, 2025

Patch

·         Users are urged to update their Chrome browsers to version 143.0.7158.112 or later immediately.

·         The update process is generally automatic, but manual checks ensure immediate protection.

APT Names

·         Not publicly linked, but likely government-sponsored actors or commercial spyware operators.

Associated Criminal Organization Names

·         None specified

IOCs

Not publicly disclosed

Tools Used in Campaign

Custom exploit chain for RCE/sandbox escape.

TTPs

·         T1204.001 (User Execution: Malicious Link) or similar for delivery.

·         Potential for T1068 (Exploitation for Privilege Escalation) or T1203 (Exploitation for Client Execution).

·         T1189 (Drive-by Compromise) possible delivery method.

Malware Name

·         None specified at this time

Suggested Rules / potential hunts

Suricata Rules

None publicly available yet.

SentinelOne Rules

None publicly available yet.

Splunk Hunts

None publicly available yet.

Delivery Method

·         Likely through a malicious website that the user is tricked into visiting

Email Samples

No email samples released to the public.

References

Security Week

·         hxxps://www.securityweek.com/google-patches-mysterious-chrome-zero-day-exploited-in-the-wild

Bit Defender

·         hxxps://www.bitdefender.com/en-us/blog/hotforsecurity/google-chrome-zero-day-dec-11-2025

The Hacker News

hxxps://thehackernews.com/2025/12/chrome-targeted-by-active-in-wild.html

CyberNews

·         hxxps://cybernews.com/security/chrome-zero-day-angle-exploit/

Tenable

·         hxxps://www.tenable.com/cve/CVE-2025-24372/plugins

·         hxxps://www.tenable.com/plugins/nessus/278158

·         hxxps://www.tenable.com/plugins/nessus/278157

Previous
Previous

GeoServer XXE Vulnerability CVE-2025-58360

Next
Next

NANOREMOTE Malware Using Google Drive API for C2