MultiApp-MultiCVE-2025-4609-4664


Lookout Coverage and Recommendation for Admins
Lookout customers will see them tracked as MultiApp-MultiCVE-2025-4609-4664 in their administrator console. To ensure your devices are protected, Lookout admins should take the following steps in their Lookout console:
- Enable the Application Vulnerability policy, which detects when a vulnerable app version is installed on the device.
- Lookout will publish coverage on June 5th 2025 after which alerts will be generated based on the admin's risk, response, and escalation setup.
- Any device with vulnerable versions of Chrome (below 136.0.7103.125) or Edge (below 136.0.3240.76) will receive an alert if detected after that date.
- Enable Lookout Phishing & Content Protection (PCP) to protect mobile users from malicious phishing campaigns that are built to exploit these vulnerabilities.
Overview
Google has recently disclosed two critical vulnerabilities in its Chrome web browser. CVE-2025-4609 is described as a high-severity vulnerability in Chrome’s Mojo IPC system. It involves incorrect handle usage under unspecified conditions, potentially creating a security loophole. Meanwhile, CVE-2025-4664 is a critical zero-day vulnerability, actively exploited in the wild. It involves insufficient policy enforcement in the Chromium Loader-a component also used in Microsoft Edge. A remote attacker could exploit the security defect to leak cross-origin data via a maliciously crafted HTML page. Google Chrome on Android is patched in versions 136.0.7103.125 and above. MS Edge is patched in versions 136.0.3240.76 and above.
Lookout Analysis
Vulnerabilities like these can have an outsized impact on mobile fleets, especially when they exist in everyday apps such as mobile browsers. In addition to gaining remote access to vulnerable devices, successful exploits in browsers also frequently grant the attacker access to the same permissions as the browsers.
Each of the disclosed vulnerabilities can be exploited via a maliciously crafted webpage, which means that attackers can deliver them as URLs in the same way they would deliver phishing attacks on mobile devices. This means they would likely socially engineer an individual through SMS, iMessage, WhatsApp, Telegram, Instagram, LinkedIn, or any of the countless messaging and social media apps on mobile devices. A successful attack could lead to continued data leakage and risk for enterprise organizations.
Authors


Lookout Mobile Endpoint Security
Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.
Advanced mobile Endpoint Detection & Response powered by data from 185M+ apps and 200M+ devices on iOS, Android, ChromeOS.