Zero-Day Alert: Critical Chrome Exploit Patched — Available Now via Easy2Patch

March 26, 2025 2 min read

Zero-Day Alert: Critical Chrome Exploit Patched — Available Now via Easy2Patch Google has released an emergency patch for a high-severity zero-day vulnerability in Chrome for Windows, which has already been exploited in targeted cyber-espionage campaigns against organizations in Russia. The vulnerability, tracked as CVE-2025–2783, is now available for deployment through Easy2Patch for supported environments.

This flaw, described as an “incorrect handle in unspecified conditions in Mojo on Windows”, allows attackers to bypass Chrome’s sandbox security. Mojo is a set of IPC (inter-process communication) libraries used across platforms.

As always, Google has withheld technical specifics regarding the exploit, but confirmed: “An exploit for CVE-2025–2783 exists in the wild.”

This marks Chrome’s first zero-day actively exploited in 2025, and it’s already been added to the Easy2Patch catalog, allowing IT administrators to deploy the fix rapidly across enterprise environments.

The vulnerability was discovered and responsibly disclosed by Kaspersky researchers Boris Larin and Igor Kuznetsov on March 20, 2025.

Once a victim clicked the malicious link — opened via Google Chrome — infection was immediate. No further user interaction was necessary. This attack chain demonstrates how crucial timely patching is in today’s evolving threat landscape.

With Easy2Patch, organizations can respond proactively. CVE-2025–2783 is already packaged and available for deployment, allowing seamless updates to Chrome version 134.0.6998.177/.178 on Windows. Kaspersky’s analysis indicates that the flaw exploits a logic error between Chrome and the Windows OS, enabling attackers to break out of the browser sandbox. It is also believed to be used in combination with a secondary remote code execution exploit, which remains undisclosed.

The phishing campaign targeted media, academia, and government sectors within Russia. Every indicator points to a state-sponsored APT group behind the campaign, aiming for long-term espionage.

IT security teams using Easy2Patch can ensure immediate protection, not only for Chrome but for all Chromium-based browsers such as Edge, Opera, and Vivaldi, once patches are released. Easy2Patch continuously monitors and updates third-party applications, ensuring zero-day vulnerabilities like this don’t become entry points for attackers.

Info 

Stay ahead of threats — deploy CVE-2025–2783 fix via Easy2Patch today and protect your environment with one-click automation.

Get started with our patch management software for free Advanced Patch Management Get 30 Days Premium Trial