Thursday April 24, 2025

Advisory ID: NCC-CSIRT-2025-002

CVE:                  CVE-2025-2783

Probability:       High

Impact:              High

Product (s):        Google Chrome

Version (s):         Multiple (prior to patched version addressing CVE-2025-2783)

Platform (s):       Windows, macOS, Linux

Threat Type (s): Zero-Day Exploit, Remote Code Execution, Advanced Persistent Threat (APT)

Summary

A sophisticated zero-day vulnerability in Google Chrome (CVE-2025-2783) is being exploited in the wild, allowing attackers to bypass browser sandbox protections via malicious links..

Consequences

Remote Code Execution, System Compromise, Espionage, and Unauthorized Access.

Description

Kaspersky has identified an advanced Chrome zero-day exploit (CVE-2025-2783) used in targeted espionage operations. The vulnerability allows attackers to bypass sandbox protections using a specially crafted link, requiring only a user click to compromise the system. This attack has been linked to an APT group targeting government, media, and educational institutions in Russia. Although the campaign was geographically focused, similar techniques may be deployed elsewhere. The exploit's complexity and stealth make it a serious threat.

Solution

Google has released a patch to address CVE-2025-2783. All users are strongly advised to immediately update their Chrome browsers to the latest version to mitigate this vulnerability. System administrators should also ensure automatic updates are enabled and monitored across endpoints..

References

https://securelist.com/operation-forumtroll/115989/

https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html