Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Fixed vulnerabilities in Google Chrome (AL02/250305/CSIRT-ITA)

Fixed vulnerabilities in Google Chrome (AL02/250305/CSIRT-ITA)

Summary

Google has released an update for the Chrome browser to fix 14 security vulnerabilities, including one with a severity of “high”. This vulnerability, if exploited, could allow a malicious user to execute arbitrary code on the target systems.

Risk

Estimate of the impact of the vulnerability on the reference community: (High 65.12)

Type

  • Arbitrary Code Execution

Affected products and/or versions

Google Chrome

  • versions prior to 134.0.6998.35/36 for Windows
  • versions prior to 134.0.6998.44/45 for Mac
  • versions prior to 134.0.6998.35 for Linux

Mitigation actions

In line with Google’s statements, it is recommended to update the product for Windows, Mac and Linux to the latest available version.

As indicated by the vendor, only the indicators detected by external researchers with “high” severity are reported:

CVE
CVE-2025-1914

References

https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services