India Issues High Security Alert: Chrome and Firefox Users Must Update Now (October 2025)

CERT-In High Alert

India’s CERT-In Browser Alert: What You Need to Know

On October 21, 2025, the Computer Emergency Response Team of India (CERT-In) issued a high-severity warning for millions of Google Chrome and Mozilla Firefox users. Critical flaws in both browsers impacting Windows, macOS, Linux, and Android could allow remote attackers to steal data, execute malicious code, or crash systems entirely. Users must update immediately.

Short Answer: India’s cybersecurity agency has identified heap buffer overflows, memory corruption bugs, and improper cookie isolation in Chrome and Firefox. Update Chrome to 141.0.7390.65/.66 and Firefox to 144 or higher to block exploits.

What Happened? Details of the CERT-In Advisory

CERT-In’s advisory follows discovery of multiple dangerous vulnerabilities:

  • Heap buffer overflow in Chrome’s WebGPU and Video components
  • Integer overflow in Firefox’s Canvas2D graphics system
  • Just-In-Time (JIT) miscompilation in Firefox’s JavaScript engine
  • Improper cookie storage isolation across both browsers

An attacker who convinces a user to visit a malicious page could trigger these flaws, leading to remote code execution or data disclosure. Over 140,000 browser-based attacks targeted outdated versions in India over the past year, underscoring the urgency.

Affected Versions & Platforms

BrowserAffected VersionsFixed In
Chrome< 141.0.7390.54 (Linux), < 141.0.7390.54/55 (Win/Mac)141.0.7390.65/.66
Firefox< 144144
Firefox ESR< 115.29, < 140.4115.29, 140.4
Thunderbird< 140.4140.4

How to check your version:

  1. Chrome: Menu → Help → About Google Chrome
  2. Firefox/Thunderbird: Menu → Help → About Firefox (or Thunderbird)

Why These Flaws Matter

  • Remote Code Execution (RCE): Attackers can run arbitrary code install malware, steal files, or deploy ransomware.
  • Data Theft: Session cookies or stored credentials may be exposed, leading to account hijacking.
  • System Instability: Heap overflows can crash the browser or entire system.

In real-world tests, delayed updates allowed phishing payloads to leverage the Chrome WebGPU overflow within hours of advisory publication.

Step-by-Step Update Guide

Google Chrome

  1. Open Chrome.
  2. Click the three-dot menu (⋮) → Help → About Google Chrome.
  3. Chrome will auto-download version 141.0.7390.65/.66.
  4. Click Relaunch to install.

Mozilla Firefox

  1. Open Firefox.
  2. Click the hamburger menu (☰) → Help → About Firefox.
  3. Firefox will auto-update to 144.
  4. Restart Firefox to complete the patch.

For Android, visit the Play Store or system updates and ensure you have the latest build.

What Happens If You Don’t Update?

  • Data Theft: Session cookies and autofill data at risk.
  • Malware Installation: Drive-by downloads can occur without user consent.
  • System Takeover: Full system compromise from a single click on a crafted link.

Case in point: a media organization delayed Firefox updates by two days, leading to a targeted spear-phishing attack that exfiltrated internal emails.

Best Practices to Stay Safe

  • Enable Automatic Updates: In browser settings, turn on auto-updates.
  • Limit Extensions: Uninstall unused or untrusted add-ons.
  • Avoid Suspicious Links: Hover to verify URLs before clicking.
  • Regular Backups: Maintain offline backups of critical data.
  • Monitor Security News: Subscribe to CERT-In or browser vendor advisories.

Chrome vs. Firefox: Security Update Comparison

AspectChromeFirefox
Patch FrequencyWeeklyMajor + ESR quarterly
Vulnerability TypesHeap overflow, memory corruptionInteger overflow, JIT miscompile
Auto-Update EaseDefault onDefault on
Exploit ComplexityModerate – WebGPU & Video pipelinesHigh – Canvas2D & JS engine
User Action RequiredRestart browserRestart browser

Frequently Asked Questions

What is CERT-In?
CERT-In is India’s national authority for cybersecurity, issuing alerts on high-severity threats.

Do these flaws affect mobile browsers?
Yes Android versions of Chrome and Firefox are susceptible until updated.

Can automatic updates prevent all attacks?
They patch known vulnerabilities fast, but zero-days may still emerge.

How do I know if my browser was exploited?
Look for crashes, unknown extensions, or unusual network activity.

Are other browsers safe?
Regularly patch any browser. Edge and Safari also issue advisories.

What if I can’t update immediately?
Use a different device or browser profile, and avoid untrusted sites until patched.

The Bottom Line

CERT-In has flagged critical vulnerabilities in Chrome and Firefox that let attackers steal data or take over systems. Update to Chrome 141.0.7390.65/.66 and Firefox 144 now. Enable auto-updates, limit extensions, and stay vigilant online.

Scroll to Top