Advisory ID: NCC-CSIRT-2025-002
CVE: CVE-2025-2783
Probability: High
Impact: High
Product (s): Google Chrome
Version (s): Multiple (prior to patched version addressing CVE-2025-2783)
Platform (s): Windows, macOS, Linux
Threat Type (s): Zero-Day Exploit, Remote Code Execution, Advanced Persistent Threat (APT)
Summary
A sophisticated zero-day vulnerability in Google Chrome (CVE-2025-2783) is being exploited in the wild, allowing attackers to bypass browser sandbox protections via malicious links..
Consequences
Remote Code Execution, System Compromise, Espionage, and Unauthorized Access.
Description
Kaspersky has identified an advanced Chrome zero-day exploit (CVE-2025-2783) used in targeted espionage operations. The vulnerability allows attackers to bypass sandbox protections using a specially crafted link, requiring only a user click to compromise the system. This attack has been linked to an APT group targeting government, media, and educational institutions in Russia. Although the campaign was geographically focused, similar techniques may be deployed elsewhere. The exploit's complexity and stealth make it a serious threat.
Solution
Google has released a patch to address CVE-2025-2783. All users are strongly advised to immediately update their Chrome browsers to the latest version to mitigate this vulnerability. System administrators should also ensure automatic updates are enabled and monitored across endpoints..
References
https://securelist.com/operation-forumtroll/115989/
https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html