The Indian Computer Emergency Response Team (CERT-IN), under the Ministry of Electronics and Information Technology (Meity), has released a high-quality report for desktop users from Google Chrome. This advice influences systems that are performed on Windows, MacOS and Linux and warns of important security errors in outdated versions of the browser. These vulnerabilities may be used by cyber criminals to get remote control over compromised devices.
According to the warning, Chrome versions prior to 136.0.7103.113 on Linux and versions prior to 136.0.7103.113 or 136.0.7103.114 on Windows and Mac can be exploited. The mistakes stem from weaknesses in two components of the browser: the charger and Mojo. While the charger suffers from insufficient policy enforcement, MOJO DIE is facilitated inter-process communication facilitated for incorrect treatment. These meshes can be used by attackers to perform random code, which may endanger a whole system.
What adds urgency to the advice is the active exploitation of one of the vulnerabilities, identified as CVE-2025-4664. Certify that cyber criminals already use this error in real-world attacks. The vulnerability can be activated when a user is misled to visit a malicious website or click on a compromised link, with which attackers can inject malware, steal personal data or even crash the system.
Google has confirmed that the problems are patched in the latest Chrome versions – 136.0.7103.113 and 136.0.7103.114 – which are released via the stable channel of the browser. Users are encouraged to immediately update their browsers to protect their systems against potential infringements.
Fortunately, updating Chrome is a simple process. Users can easily open the browser, click on the Three-Punts menu in the right corner, navigate to StaffAnd then select About Google Chrome. The browser automatically checks available and installs it. Returning Chrome completes the update process.
Cert-in strongly advises all individuals and organizations that use Chrome on desktop computers to ensure that they perform the latest version as quickly as possible. Fast action could help to prevent serious cyber attacks from being known in circulation.