Gadget Bridge
HomeNewsGoogle Chrome for Windows and Mac users data at RISK, CERT-In warns

Google Chrome for Windows and Mac users data at RISK, CERT-In warns

The government stresses the need to update to the most recent browser version.

CERT-In has released a serious warning for Google Chrome users on Mac, Windows, and Chromebooks, pointing out a number of flaws that might let hackers access private information, run arbitrary code, or disrupt the system. It is recommended that users upgrade their operating systems and browsers right away.

The Indian Computer Emergency Response Team (CERT-In) has issued a warning after identifying two vulnerabilities in Google Chrome that allow attackers to compromise user data and devices. The vulnerability is present in Google Chrome versions before 132.0.6834.83/8r on Windows/Mac, 132.0.6834.110/111 on Windows and Macs, and 132.0.6834.110 on Linux.

CERT-In found two significant vulnerabilities in Google Chrome for Mac, CIVN-2025-0007 and CIVN-2025-0008, that could allow attackers to execute arbitrary code, create a DoS, or bypass security restrictions. The issues are classified as quite severe and are reported to affect Chrome versions prior to 132.0.6834.83/8r. Out-of-bounds memory access, incorrect navigation implementation, and insufficient data validation allow attackers to execute arbitrary code, cause DoS, or overcome security restrictions.

- Advertisement -

Also Read: Lava Yuva Smart budget smartphone launched in India

Because of bugs in stack buffer overflow, integer overflow, and out-of-bounds memory access, ChromeOS, the operating system that powers Chromebooks, is susceptible to spoofing, cross-site scripting, and remote code execution. These flaws could be used by remote attackers to run malicious web pages and possibly acquire private information. Because desktops, laptops, and Chromebooks are more vulnerable than smartphones, CERT-In advises users of outdated Chrome or ChromeOS versions to exercise caution.

Chrome versions prior to 132.0.6834.110/111 include vulnerabilities that put Windows users and organisations at risk. By sending carefully crafted requests, hackers can take advantage of these vulnerabilities, which could result in data exfiltration, system failures, or illegal access to private data.

Also Read: Titan Valerie Review: Should you buy this watch?

- Advertisement -

As hackers take advantage of these issues, ignoring warnings can result in data breaches, unstable systems, and illegal access to private data. Update ChromeOS and Google Chrome to the most recent versions, check for updates frequently, and enable automatic updates to protect your device.

Support Us

We are a humble media site trying to survive! As you know we are not placing any article, even the feature stories behind any paywall or subscription model. Help us stay afloat, support with whatever you can!

Support us
- Advertisement -
Komila Singh
Komila Singhhttp://www.gadgetbridge.com
Komila is one of the most spirited tech writers at Gadget Bridge and is a senior resource in the company. Always up for a new challenge, she is an expert at dissecting technology and getting to its core. She loves to tinker with new mobile phones, tablets and headphones.
- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -

Latest From Gadget Bridge

Volleyball Legends Codes (September 2025)

If you’re a fan of the anime series Haikyuu, you cannot miss its Roblox adaptation. Previously known as...
- Advertisement -

Latest Reviews

Lava Blaze Dragon 5G Review: The budget smartphone that breathes fire

Lava’s newest entry-level offering is priced at Rs 10,000. At this price point, it faces tough competition from...
- Advertisement -

Tech How To

How to create a calling card in Google Contacts

Google's new facelift for its Phone app hasn’t gone down well with its users. However, the Contacts app...
- Advertisement -