PT-2025-50966 · Google +2 · Angle +4
Published
2025-12-10
·
Updated
2026-01-14
·
CVE-2025-14174
CVSS v3.1
8.8
8.8
High
| Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Google Chrome versions prior to 143.0.7499.110
Microsoft Edge (Chromium-based) versions prior to 143.0.7499.110
Apple Safari (affected versions not specified)
Apple iOS, iPadOS, and macOS versions (affected versions not specified)
Apple tvOS and watchOS versions (affected versions not specified)
Vivaldi versions prior to 125.0.5729.49
Opera versions prior to 125.0.5729.49
Opera GX versions prior to 125.0.5729.47
Opera Air versions prior to 125.0.5729.39
Opera Neon versions prior to 125.0.5729.40
webkit2gtk versions (affected versions not specified)
webkit2gtk3 versions (affected versions not specified)
wpewebkit versions (affected versions not specified)
SberLinux versions (affected versions not specified)
Debian webkit2gtk versions (affected versions not specified)
Description
A high-severity out-of-bounds memory access issue exists in the ANGLE graphics engine, impacting multiple browsers including Google Chrome, Microsoft Edge, Safari, and others based on Chromium. This flaw allows a remote attacker to potentially perform out-of-bounds memory access through a crafted HTML page. The vulnerability has been actively exploited in the wild. The issue stems from improper authorization enforcement, where the application validates requests but fails to consistently verify user permissions. The vulnerability was initially reported by Apple SEAR and Google TAG. It is a memory corruption issue that can lead to remote code execution. The vulnerability is related to a race condition that was addressed by improving state handling.
Recommendations
Google Chrome versions prior to 143.0.7499.110: Update to version 143.0.7499.110 or later.
Microsoft Edge (Chromium-based) versions prior to 143.0.7499.110: Update to version 143.0.7499.110 or later.
Apple Safari (affected versions not specified): Update to the latest available version.
Apple iOS, iPadOS, and macOS versions (affected versions not specified): Update to the latest available version.
Apple tvOS and watchOS versions (affected versions not specified): Update to the latest available version.
Vivaldi versions prior to 125.0.5729.49: Update to version 125.0.5729.49 or later.
Opera versions prior to 125.0.5729.49: Update to version 125.0.5729.49 or later.
Opera GX versions prior to 125.0.5729.47: Update to version 125.0.5729.47 or later.
Opera Air versions prior to 125.0.5729.39: Update to version 125.0.5729.39 or later.
Opera Neon versions prior to 125.0.5729.40: Update to version 125.0.5729.40 or later.
webkit2gtk versions (affected versions not specified): Update to the latest available version.
webkit2gtk3 versions (affected versions not specified): Update to the latest available version.
wpewebkit versions (affected versions not specified): Update to the latest available version.
SberLinux versions (affected versions not specified): Update to the latest available version.
Debian webkit2gtk versions (affected versions not specified): Update to the latest available version.
Fix
RCE
Buffer Overflow
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
CVE-2025-14174
DLA-4414-1
DSA-6083-1
Affected Products
Angle
Debian
Google Chrome
Google Chromium
Apple Macos
References · 100
- https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html · Security Note
- https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-14174 · Security Note
- https://twitter.com/ox0ffff/status/2004676472791851113 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1pndz33/apple_and_google_respond_to_active_zeroday_threats · Reddit Post
- https://reddit.com/r/secithubcommunity/comments/1plmkev/apple_confirms_active_iphone_exploitation_update · Reddit Post
- https://twitter.com/marcfredericgo/status/2000458590306386418 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1poagwu/secopsdaily_20251216_roundup · Reddit Post
- https://twitter.com/VulmonFeeds/status/1999590806626128356 · Twitter Post
- https://twitter.com/ImperialTechSvc/status/2000683964449632460 · Twitter Post
- https://t.me/cveNotify/146185 · Telegram Post
- https://twitter.com/kawn2020/status/1999672229173559651 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1plpqgg/apple_security_updates_address_exploited_webkit · Reddit Post
- https://twitter.com/zeroxjf/status/2010938753674621033 · Twitter Post
- https://reddit.com/r/KibernetinisSaugumas/comments/1pmbsjq/realiai_i%C5%A1naudoti_pa%C5%BEeid%C5%BEiamumai_apple_privert%C4%97 · Reddit Post