SonicWall has released a security update to fix a privilege escalation vulnerability in the SonicWall SMA1000 Appliance Management Console (AMC) that was tricked in zero-day attacks to escalate privileges.
Summary : Several high severity vulnerabilities were recently identified in Google Chrome, impacting core components such as the V8 JavaScript engine, Chrome Updater, DevTools and Digital Credentials module.
The primary high-severity vulnerability, a Type Confusion bug in the V8 engine (CVE-2025-13630), could allow attackers to achieve memory corruption that may lead to remote code execution via malicious web content. Google says that that it handed out $11,000 for the V8 vulnerability and $3,000 for the Google Updater bug.
Severity
High
CVSS Score
Not Published
CVEs
CVE-2025-13630, CVE-2025-13631, CVE-2025-13632, CVE-2025-13633 & 9 other CVEs.
POC Available
No public PoC at release time
Actively Exploited
No confirmed exploitation
Exploited in Wild
Not confirmed for Chrome 143
Advisory Version
1.0
Overview
Other vulnerabilities like privilege escalation, unauthorized actions or browser misuse have been patched in the latest Chrome update. Administrator and users are strongly urged to update to the chrome 143 release immediately.
Vulnerability Name
CVE ID
Product Affected
Severity
Fixed Version
Type-Confusion Vulnerability in V8 JavaScript Engine
CVE-2025-13630
Chrome
High
v143.0.7499.40/41
Inappropriate Implementation in Google Updater
CVE-2025-13631
Chrome
High
v143.0.7499.40/41
Inappropriate Implementation in DevTools
CVE-2025-13632
Chrome
High
v143.0.7499.40/41
Use-After-Free Vulnerability in Digital Credentials
CVE-2025-13633
Chrome
High
v143.0.7499.40/41
Technical Summary
Several high-severity vulnerabilities were addressed in Google Chrome versions prior to 143.0.7499.40/41. The most critical involves a type of confusion flaw in the V8 JavaScript engine, which permits remote attackers to exploit improper object type handling, causing heap corruption when a user accesses a specially crafted webpage and potentially leading to remote code execution under certain conditions.
Other significant issues include a flawed update mechanism that may trigger unintended actions during updates, a logic error within DevTools that could result in tool misuse or unintended execution paths, and a use-after-free vulnerability in the digital credential processing components that may cause memory corruption and browser instability.
Together, these flaws can be exploited to bypass update protections, escalate privileges, disrupt developer tools, or compromise sensitive credential operations.
CVE ID
System Affected
Vulnerability Details
Impact
CVE-2025-13630
Chrome 142 and prior
Type Confusion in V8 engine allows crafted JavaScript to trigger memory corruption leading to possible arbitrary code execution
Remote Code Execution
CVE-2025-13631
Chrome 142 and prior
Inappropriate implementation in Chrome Updater may allow unauthorized update-related actions
Privilege Escalation
CVE-2025-13632
Chrome 142 and prior
Inappropriate implementation in DevTools may allow unintended function execution
Unauthorized Code Paths / Sandbox Interaction
CVE-2025-13633
Chrome 142 and prior
Use-after-free in Digital Credentials processing leads to memory corruption
Memory Corruption / Crash
Remediation:
Upgrade Chrome to the latest version: 143.0.7499.40/41 (Windows, Mac, Linux).
Here are some recommendations below
Manual Update Check: Navigate to Settings → Help → About Google Chrome to trigger the update.
Enforce Chrome auto-updates through enterprise patch management policies.
Enable endpoint exploit protection such as browser sandboxing to strengthen environment security.
Continuously monitor logs for unusual crashes, script anomalies, or signs of exploitation attempts.
Conclusion: Chrome 143 patches critical flaws in the JavaScript engine, updater, DevTools, and credentials, preventing remote code execution and memory corruption.
Users and administrators are strongly advised to promptly upgrade to the latest Chrome version and implement security best practices such as enforcing automatic updates, enabling endpoint exploit protections and monitoring for any signs of exploitation to maintain a strong defense against potential attacks.
Additionally, Google announced that the browser’s Extended Stable channel has been updated to version 142.0.7499.226 for Windows and macOS.
Summary : A security flaw was discovered in SonicWall’s SonicOS SSLVPN component, affecting both hardware and virtual firewall appliances across Gen7 and Gen8 product lines.
OEM
SonicWall
Severity
High
CVSS Score
7.5
CVEs
CVE-2025-40601
POC Available
No
Actively Exploited
No
Exploited in Wild
No
Advisory Version
1.0
Overview
The SonicWall vulnerability allows remote attackers, without any authentication, to crash into affected firewalls by sending specially crafted traffic to the SSLVPN service. There are no public exploitation in the wild but it is strongly advised customers to apply the available patches immediately to minimize risk.
In simple terms, the component fails to validate the size or structure of certain data before copying it to a stack‐allocated buffer. Under malicious input, the overflow can overwrite the stack, leading the firewall device to crash.
Vulnerability Name
CVE ID
Product Affected
Severity
Fixed Version
Stack-based buffer overflow in SonicOS SSLVPN service
CVE-2025-40601
SonicWall SonicOS Firewalls (Gen7 and Gen8 Hardware and Virtual)
High
7.3.1-7013 (Gen7), 8.0.3-8011 (Gen8) and latest one
Technical Summary
The vulnerability occurs due to a stack-based buffer overflow affecting the SSLVPN service of SonicOS. Devices with the SSLVPN interface enabled are vulnerable.
This flaw permits remote unauthenticated attackers to trigger a denial-of-service condition, leading to a full firewall crash and service outage.
The problem impacts a wide range of SonicWall firewall models including Gen7 (TZ270, NSa 2700 series etc) and Gen8 (TZ280, NSa 2800 series etc). Administrators are urged to upgrade to the latest versions and restrict SSLVPN access to trusted IPs or disable external-facing SSLVPN portals until remediation is complete.
CVE ID
Component Affected
Vulnerability Details
Impact
CVE-2025-40601
SonicWall SonicOS SSLVPN service
Stack-based buffer overflow allows remote unauthenticated attackers to send crafted requests causing a denial-of-service crash of the firewall. Only devices with SSLVPN enabled are vulnerable.
Remote denial-of-service
Recommendations
Update SonicWall immediately to the following fixed versions:
Gen7 Hardware Firewalls: 7.3.1-7013 and higher versions
Gen7 Virtual Firewalls : 7.3.1-7013 and higher versions
Gen8 Firewalls: 8.0.3-8011 and higher.
You can follow some below workaround here
Temporarily disable the SSLVPN service if possible or restrict SSLVPN access only to trusted source IP addresses.
Avoid exposing the SSLVPN service to untrusted internet sources until patched.
Continuously monitor firewall and network logs for unusual SSLVPN activity or connection attempts that might indicate probing or exploitation attempts.
Conclusion: There has no evidence of active exploitation for this vulnerability, but the issue makes unpatched firewalls highly attractive targets for threat actors capable of causing major network outages.
Organizations relying on SonicWall should prioritize applying the latest patches and review their SSLVPN exposure as part of broader incident prevention. For those unable to patch immediately, restricting or disabling external SSLVPN access is strongly recommended until fixes can be deployed.
Summary : Security advisory: Google has released an urgent security update to patch two high-severity Type Confusion vulnerabilities in the V8 JavaScript engine. The CVEs vulnerabilities are CVE-2025-13223, CVE-2025-13224 .
OEM
Google
Severity
High
CVSS Score
8.8
CVEs
CVE-2025-13223, CVE-2025-13224
POC Available
No
Actively Exploited
Yes
Exploited in Wild
Yes
Advisory Version
1.0
Overview
One of these vulnerability (CVE-2025-13223) is already being actively exploited in the wild, allowing attackers to potentially execute arbitrary code through malicious web content. which attackers can bypass Chrome’s sandbox, steal sensitive data, or deploy malware. The fixes have been rolled out for Chrome Stable 142.0.7444.175/.176 across Windows, Mac, and Linux.
Vulnerability Name
CVE ID
Product Affected
Severity
Fixed Version
Type Confusion Vulnerability in V8 JavaScript Engine
CVE-2025-13223
Google Chrome
High
v142.0.7444.175 / v142.0.7444.176
Type Confusion Vulnerability in V8 JavaScript Engine
CVE-2025-13224
Google Chrome
High
v142.0.7444.175 / v142.0.7444.176
Technical Summary
Both vulnerabilities occur from Type Confusion vulnerabilities in Chrome’s V8 engine, where incorrect data-type handling leads to memory corruption and possible code execution. The CVE-2025-13223 is already being exploited in the wild and may involve APT-driven activity.
Another vulnerability was found internally through Google’s Big Sleep fuzzing system as part of ongoing proactive defense.
These weaknesses can allow attackers to bypass browser security boundaries and execute malicious actions remotely. Urgent need for users and administrators to apply Chrome’s latest security updates immediately.
CVE ID
System Affected
Vulnerability Details
Impact
CVE-2025-13223
Google Chrome (V8 Engine)
Type confusion due to improper type handling in V8 allowing memory corruption.
Remote Code Execution, Sandbox Escape
CVE-2025-13224
Google Chrome (V8 Engine)
Type confusion triggered during script execution, discovered via fuzzing
Remote Code Execution, Browser Crash
Remediation:
Immediate Action: Users and organization administrators should update Chrome immediately to the following patched versions:
Windows: 142.0.7444.175 / 142.0.7444.176
MacOS: 142.0.7444.176
Linux: 142.0.7444.175
Here are some recommendations below
Enforce Chrome auto-updates on all endpoints via enterprise policies.
Monitor browser crash logs and unusual behaviors tied to JavaScript execution.
Run updated vulnerability & patch management tools to ensure full endpoint compliance.
Educate users to avoid suspicious links and unknown websites during active exploitation events
Conclusion: With Chrome being the most widely used browser globally, prompt updates are essential for the new security vulnerabilities. Maintaining browsers at the latest versions remains the strongest defenses against modern web-based attacks in modern cyber world.
Zoho Analytics on-premise installations were recently found to have a SQL Injection vulnerability- CVE-2025-8324 that exposes enterprise environments to risk. The flaw is prevalent in all Zohocorp ManageEngine products, built prior to the most recent patch and enables attackers to exploit weaknesses in the application’s input validation logic.
The flaw enables attackers to execute queries without authentication mainly arbitrary SQL injection, without prior authentication, leading to unauthorized data exposure and account takeovers.
OEM
Zoho
Severity
Critical
CVSS Score
9.8
CVEs
CVE-2025-8324
POC Available
No
Actively Exploited
No
Exploited in Wild
No
Advisory Version
1.0
Overview Malicious actors can launch attacks remotely and takeover user accounts, sensitive analytics data and any connected business intelligence workflows. Administrators are urged to update to the latest version to mitigate this risk.
Vulnerability Name
CVE ID
Product Affected
Severity
Fixed Version
Unauthenticated SQL Injection
CVE-2025-8324
Zoho Analytics On-Premise
Critical
6171 and later
Technical Summary
At the root of this flaw is improper input validation for user-supplied parameters within specific URLs of the Zoho Analytics Plus backend.
This allows arbitrary SQL queries to be executed by anyone with network access to the service, even if they have no login credentials. Zoho has enforced input checks and removing vulnerable backend components altogether.
CVE ID
Component Affected
Vulnerability Details
Impact
CVE-2025-8324
Zoho Analytics Plus On-Premise
An unauthenticated SQL injection vulnerability caused by improper input validation allowing attackers to inject arbitrary SQL queries remotely without authentication.
Account takeover, user data leak
Recommendations
Organizations must update Zoho Analytics Plus On-Premises immediately to the Build 6171 version or later.
Here are some recommendations you can follow
Enforce patch deployment across all managed analytics instances to ensure consistency and security.
Continuously monitor logs for unusual SQL query activities or access attempts that could indicate exploitation attempts.
Conclusion: The Zoho Analytics On-Premise deployments, could enable full data and account compromise through unauthenticated SQL injection. CVE-2025-8324 represents a critical security risk, classified at the highest severity level due to its potential impact and ease of exploitation.
Although no active exploitation has been detected to date, the severity of the flaw demands immediate attention. Immediate patching is essential to secure environments and prevent any chance of data compromise or unauthorized access.
Summary : Microsoft’s November 2025 Patch Tuesday resolves 63 vulnerabilities across multiple Microsoft components. The Microsoft Patch Tuesday also addresses four “Critical” vulnerabilities, two of which are remote code execution vulnerabilities, one is an elevation of privileges and the fourth is an information disclosure flaw.
OEM
Microsoft
Severity
Critical
Date of Announcement
2025-11-11
No. of Patches
63
Actively Exploited
Yes
Exploited in Wild
Yes
Advisory Version
1.0
Overview : Key Updateson Patch Tuesday
The update includes one actively exploited zero-day vulnerability (CVE-2025-62215) in the Windows Kernel and five additional Critical-rated vulnerabilities affecting Office, DirectX, GDI+, Visual Studio, and Nuance PowerScribe.
This release continues Microsoft’s focus on privilege escalation and remote code execution (RCE) vulnerabilities, highlighting the urgent need for comprehensive patch management across enterprise systems.
Here are the CVE addresses for Microsoft & non-Microsoft:
63 Microsoft CVEs addressed
5 non-Microsoft CVEs addressed (Republished)
Breakdown of October 2025 Vulnerabilities
29 Elevation of Privilege (EoP)
16 Remote Code Execution (RCE)
11 Information Disclosure
3 Denial of Service (DoS)
2 Security Feature Bypass
2 Spoofing
Source: Microsoft
Vulnerability Name
CVE ID
Product Affected
Severity
CVSS Score
Windows Kernel Elevation of Privilege Vulnerability (Zero-Day, Exploited in Wild)
CVE-2025-62215
Windows 10, 11, Server 2016–2022
Critical
9.0
Microsoft Office Use-After-Free Remote Code Execution Vulnerability
CVE-2025- 62199
Microsoft Office (Word/Excel/Office Suite)
Critical
9.8
Nuance PowerScribe Missing Authorization Information Disclosure Vulnerability
CVE-2025-30398
Nuance PowerScribe 360
Critical
9.1
Windows DirectX Graphics Kernel Use-After-Free Vulnerability
CVE-2025-60716
Windows DirectX Graphics Kernel
Critical
8.8
Microsoft GDI+ Heap-Based Buffer Overflow RCE Vulnerability
CVE-2025-60724
Microsoft Graphics Component (GDI+)
Critical
8.7
Visual Studio Command Injection Remote Code Execution Vulnerability
CVE-2025-62214
Microsoft Visual Studio / Visual Studio Code
Critical
8.1
Technical Summary
The zero-day is a Windows Kernel bug that lets attackers gain full system control. Other critical & important vulnerabilities include Office and GDI+ vulnerabilities that could allow hackers to run malicious code or steal data.
Microsoft also patched issues in Visual Studio, DirectX, and Azure services. Users and admins are strongly advised to install these updates right away to stay protected.
CVE ID
System Affected
Vulnerability Details
Impact
CVE-2025-62215
Windows Kernel
Race conditions in shared resource execution enables local attackers to elevate privileges to SYSTEM (Zero-Day; Exploited in Wild)
Elevation of Privilege
CVE-2025-62199
Microsoft Office
Use-after-free vulnerability in Office allows RCE via malicious documents, typically delivered through phishing campaigns
Remote Code Execution
CVE-2025-30398
Nuance PowerScribe 360
Missing authorization vulnerability allows disclosure of sensitive medical or user data over the network
Information Disclosure
CVE-2025-60716
Windows DirectX Graphics Kernel
Use-after-free conditions allow local attackers to escalate privileges, potentially compromising the entire system
Elevation of Privilege
CVE-2025-60724
Microsoft GDI+
Heap-based buffer overflow allows attackers to execute arbitrary code remotely via crafted network traffic or malicious files
Remote Code Execution
CVE-2025-62214
Visual Studio
Command injection vulnerability allows attackers to execute arbitrary code locally in developer environments
Remote Code Execution
Source: Microsoft
In addition to several other Important severity vulnerabilities were addressed below –
The November 2025 security updates address critical and important vulnerabilities across a broad range of Microsoft products and services:
Windows Core Components
Updates for Kernel, Hyper-V, Kerberos, RRAS, WinSock, Smart Card, Bluetooth subsystems.
Microsoft Office Suite
Patches for Word, Excel, and related components impacted by RCE and Information Disclosure vulnerabilities.
Azure & Cloud Services
Fixes for Azure Monitor Agent, Dynamics 365, Entra ID, and related connectors.
Graphics Components
Patches for GDI+, DirectX, WSL GUI.
Developer Tools
Updates for Visual Studio, Visual Studio Code, and GitHub Copilot.
Third-Party Applications
Patches for Nuance PowerScribe (Medical domain).
Mobile Platform Technologies
Updates for Microsoft OneDrive for Android.
Remediation:
Install the November 2025 Microsoft security updates immediately across all Windows, Office, and Azure systems.
Here are some recommendations below
Monitor for Indicators of Compromise (IoCs) for privilege escalation attempts, new SYSTEM-level services, or unusual Office file crashes.
Ensure Windows 10 ESU enrollment for extended support systems.
Restrict local admin privileges and enforce least-privilege access.
Leverage EDR/SIEM solutions to detect suspicious kernel and Office activity.
Segment critical systems and disable unused network services (RRAS, SMB).
Conclusion: Microsoft’s November 2025 Patch Tuesday resolves 63 vulnerabilities, including one actively exploited Zero-Day and multiple Critical RCE and EoP vulnerabilities in Office, Windows Kernel, GDI+, and Visual Studio.
Given the confirmed exploitation and the presence of memory corruption vulnerabilities, immediate patch deployment is necessary to prevent potential ransomware and privilege escalation attacks in our modern cyber world.