Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Google Pays Out $55,000 Bug Bounty for Chrome Vulnerability

Google has released a Chrome 133 update to address four high-severity vulnerabilities reported by external researchers.

Chrome security

Google on Wednesday announced the rollout of a Chrome browser update that resolves four high-severity vulnerabilities that were reported by external researchers.

The first issue is a use-after-free bug in the V8 JavaScript engine, tracked as CVE-2025-0995, which earned the reporting researcher a $55,000 bug bounty reward.

Based on the amount handed out, it is likely that the security defect could be exploited to achieve remote code execution. It is not uncommon for threat actors to target V8 issues in their attacks.

A type of memory corruption bug that could lead to code execution, data corruption, and denial-of-service, use-after-free flaws could be combined with other vulnerabilities to fully compromise a system.

In Chrome, use-after-free bugs could lead to sandbox escape if an attacker can target a flaw in the underlying operating system or in a privileged Chrome component.

For several years, Google has been working on preventing the exploitation of memory safety issues in Chrome, including by migrating parts of the code to Rust, a programming language that is considered memory-safe.

Advertisement. Scroll to continue reading.

The latest Chrome update resolves two other memory safety bugs, namely a use-after-free in Navigation, tracked as CVE-2025-0997, and an out-of-bounds memory access flaw in V8, tracked as CVE-2025-0998. Additionally, it addresses an inappropriate implementation in Browser UI, tracked as CVE-2025-0996.

Google notes in its advisory that it has yet to determine the bug bounty amounts to be paid for the last three security defects.

The latest Chrome iteration is now rolling out to users as versions 133.0.6943.98/.99 for Windows and macOS, and as version 133.0.6943.98 for Linux. Users are advised to update their browsers as soon as possible.

Related: Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities

Related: Chrome 132 Patches 16 Vulnerabilities

Related: Chrome 131, Firefox 134 Updates Patch High-Severity Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.