PT-2025-12837 · Google +2 · Google Chrome +2
Published
2025-01-15
·
Updated
2025-12-09
·
CVE-2025-2783
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Google Chrome versions prior to 134.0.6998.177.
Description
A zero-day vulnerability, tracked as CVE-2025-2783, has been discovered in Google Chrome's Mojo IPC component, allowing remote attackers to escape the browser's sandbox on Windows systems. This flaw was exploited in-the-wild and believed to be part of a sophisticated campaign dubbed "Operation ForumTroll." The vulnerability enables attackers to bypass Chrome's security sandbox and execute code with elevated privileges on a user's device. The attack method effectively combines social engineering tactics with advanced technical exploits, underlining the threat posed by advanced persistent threat groups.
Recommendations
- Update Chrome to version 134.0.6998.177 or newer.
- Ensure other Chromium-based browsers (like Edge, Brave, Opera) are patched.
- Educate users about phishing threats, especially sophisticated event-based lures.
- Monitor endpoints for any signs of Trinper-like behavior.
- Review browser sandboxing policies and implement application whitelisting where possible.
Exploit
Fix
Race Condition
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
ALT-PU-2025-7539
ALT-PU-2025-7543
ALT-PU-2025-8547
BDU:2025-03258
CVE-2025-2783
GHSA-F87W-3J5W-V58P
OPENSUSE-SU-2025:0111-1
OPENSUSE-SU-2025:14961-1
OPENSUSE-SU-2025_0111-1
Affected Products
Alt Linux
Google Chrome
Suse
References · 636
- 🔥 https://github.com/bi-zone/CVE-2024-7965⭐ 49 🔗 10 · Exploit
- 🔥 https://github.com/XiaomingX/cve-2024-7965-poc⭐ 7 🔗 1 · Exploit
- https://bdu.fstec.ru/vul/2025-02568 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/711318 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/711121 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/717371 · Security Note
- https://bdu.fstec.ru/vul/2025-00712 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7967 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/714336 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7976 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10488 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0436 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/712250 · Security Note
- https://bdu.fstec.ru/vul/2024-07379 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7970 · Security Note