Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SafePay Ransomware Strikes 260+ Victims Throughout A number of Nations

    August 1, 2025

    Tesla Discovered Partly Liable in 2019 Autopilot Demise

    August 1, 2025

    Guarantee Integrity of Pharmaceutical Merchandise with Robotic Palletizing

    August 1, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Chrome 0-Day CVE-2025-4664 Exposes Home windows, Linux Browser Exercise
    AI Ethics & Regulation

    Chrome 0-Day CVE-2025-4664 Exposes Home windows, Linux Browser Exercise

    Declan MurphyBy Declan MurphyMay 23, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Chrome 0-Day CVE-2025-4664 Exposes Home windows, Linux Browser Exercise
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    A newly disclosed vulnerability in Google Chrome and Chromium-based browsers is placing customers prone to information leaks. Tracked as CVE-2025-4664, the flaw permits attackers to extract delicate info like login tokens and session IDs from beforehand visited web sites.

    The safety situation was detailed right now by Wazuh, a cybersecurity firm specializing in open-source menace detection. It impacts customers on each Home windows and Linux, together with Debian and Gentoo methods.

    How It Works

    The problem resides within the Chrome’s dealing with of the Hyperlink HTTP header when loading sub-resources like photographs and scripts. Whereas most browsers ignore referrer insurance policies in these headers, Chrome accepts them, even on cross-origin requests. Meaning an attacker can deliberately set a relaxed coverage, equivalent to unsafe-url, to entry full referrer URLs.

    These URLs can embrace delicate information from different websites a person lately visited. If an attacker controls the vacation spot server, they will quietly gather that information with out the person realizing.

    Who’s Affected

    Customers on the next methods are weak if their browsers haven’t been up to date:

    • Home windows: Google Chrome variations earlier than 136.0.7103.113
    • Debian 11 Linux: Chromium as much as model 120.0.6099.224
    • Gentoo Linux: Chrome or Chromium variations earlier than 136.0.7103.113

    What to Do

    Google has issued an emergency replace to repair the vulnerability in Chrome on Home windows and Chromium on Gentoo Linux. Debian customers ought to uninstall affected variations of Chromium till a patched model turns into obtainable.

    How you can Manually Replace Chrome (If auto-update is turned off)

    If Chrome isn’t updating robotically, observe these steps to ensure you’re working the newest model and guarded towards CVE-2025-4664:

    1. Open Chrome – Launch Google Chrome in your machine.
    2. Go to the Menu – Click on the three vertical dots within the top-right nook of the browser window.
    3. Choose “Assist” → “About Google Chrome” – This may open a brand new tab that reveals your present model and robotically checks for updates.
    4. Await Chrome to Examine for Updates – If a more recent model is out there, Chrome will begin downloading it straight away.
    5. Click on “Relaunch” – As soon as the replace is downloaded, click on “Relaunch” to restart the browser and full the set up.

    Examine Replace Standing After Relaunch

    To verify the replace, return to Assist > About Google Chrome. The browser ought to now present the newest model quantity and the message “Google Chrome is updated.”

    In the event you’re on Home windows, be sure the Chrome Replace service is enabled in your system settings or by way of the Group Coverage Editor. On Linux methods, particularly these utilizing Chromium, updates might require package deal supervisor instructions or guide downloads relying on the distribution.

    Wazuh’s weblog put up explains the significance of proactive vulnerability detection. Their instruments present real-time monitoring and insights that assist directors keep on high of safety threats, particularly when zero-day flaws like this one come into play.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    SafePay Ransomware Strikes 260+ Victims Throughout A number of Nations

    August 1, 2025

    Cybercrooks faked Microsoft OAuth apps for MFA phishing

    August 1, 2025

    Everest Ransomware Claims Mailchimp as New Sufferer in Comparatively Small Breach

    August 1, 2025
    Top Posts

    SafePay Ransomware Strikes 260+ Victims Throughout A number of Nations

    August 1, 2025

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    SafePay Ransomware Strikes 260+ Victims Throughout A number of Nations

    By Declan MurphyAugust 1, 2025

    The SafePay ransomware group has shortly grow to be a strong operator since its preliminary…

    Tesla Discovered Partly Liable in 2019 Autopilot Demise

    August 1, 2025

    Guarantee Integrity of Pharmaceutical Merchandise with Robotic Palletizing

    August 1, 2025

    Cybercrooks faked Microsoft OAuth apps for MFA phishing

    August 1, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.