Thursday, April 17, 2025
HomeChromeWarning!! New Chrome 0-Day Bug Being Exploited In The Wild

Warning!! New Chrome 0-Day Bug Being Exploited In The Wild

Published on

SIEM as a Service

Follow Us on Google News

Google Chrome released a new security update for Windows, Linux & Mac users and an update for a new high severity Zero-day bug that is being actively exploited wild by unknown threat actors.

Chrome 104 was released with the fixes of 11 security vulnerabilities, including one critical severity bug and six high severity bugs reported by the Google Project Zero Team and external security researchers.

A Critical Use after free bug(CVE-2022-2852) Reported by Sergei Glazunov of Google Project Zero in Federated Credential Management API (FedCM) Let hackers allow take over the system remotely.

- Advertisement - Google News

A high severity Zero-day bug CVE-2022-2856 allows Insufficient validation of untrusted input in Intents that was reported by Ashley Shen and Christian Resell of Google Threat Analysis Group has exploited wild.

This is the 5th Zero-day Bug that was uncovered this year, Chrome users are urged to update their browsers immediately.

Vulnerability Details:

CVE-2022-2852:  Use after free in FedCM  – Critical
CVE-2022-2854: Use after free in SwiftShader – High
CVE-2022-2855: Use after free in ANGLE  – High
CVE-2022-2857: Use after free in Blink  – High
CVE-2022-2858: Use after free in Sign-In Flow   – High
CVE-2022-2853: Heap buffer overflow in Downloads  – High
CVE-2022-2856: Insufficient validation of untrusted input in Intents  – High (Exploited Wild)
CVE-2022-2859: Use after free in Chrome OS Shell – Medium 
CVE-2022-2860: Insufficient policy enforcement in Cookies -Medium 
CVE-2022-2861: Inappropriate implementation in Extensions API – Medium 

According to the Google release report “The Stable channel has been updated to 104.0.5112.101 for Mac and Linux and 104.0.5112.102/101 for Windows which will roll out over the coming days/weeks. The extended stable channel has been updated to 104.0.5112.101 for Mac and 104.0.5112.102 for Windows, which will roll out over the coming days/weeks”

To upgrade your old Chrome, then you have to follow a few simple steps that we have mentioned below:-

  • First of all, you have to go to Settings.
  • Then click on the Help option.
  • After that, you have to select the About Google Chrome option.
  • That’s it, now your browser will automatically check for the new update and install it.

Also Read: Download Free Secure Web Filtering – E-book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

China Plans Expanded Cybersecurity Cooperation with Russia

China has announced a significant step forward in its partnership with Russia, with plans...

Ghost Ransomware Targets Organizations Across 70+ Countries

A new ransomware variant known as "Ghost" (also referred to as Cring) has emerged...

Weaponized Amazon Gift Cards Used to Steal Microsoft Credentials

Cybercriminals are exploiting the trust in e-gift cards and the prestige of Amazon to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

China Plans Expanded Cybersecurity Cooperation with Russia

China has announced a significant step forward in its partnership with Russia, with plans...

Ghost Ransomware Targets Organizations Across 70+ Countries

A new ransomware variant known as "Ghost" (also referred to as Cring) has emerged...