Wednesday, March 12, 2025
HomeChromeHackers Actively Exploited A Critical Chrome 0-Day Vulnerability In Wide - Update...

Hackers Actively Exploited A Critical Chrome 0-Day Vulnerability In Wide – Update Your Chrome Now!!

Published on

SIEM as a Service

Follow Us on Google News

Recently, to fix four new vulnerabilities Google updated its Chrome browser to the new version, “91.0.4472.114.” Among those four vulnerabilities, the security experts identified a critical 0-day vulnerability that is being exploited widely by hackers.

The security researchers have marked the 0-day flaw as CVE-2021-30554, and this is the second Chrome 0-day flaw that is patched by Google this month, while this year it’s the seventh one that’s being exploited before patching.

While this Chrome 0-Day vulnerability CVE-2021-30554 was actually reported by an anonymous user, and that’s why the bug reward for this bug also remains undisclosed.

Flaws Detected

Along with the 0-Day vulnerability, in this release, the developers have also fixed three more use-after-free problems in Chrome Sharing, WebAudio, and TabGroups. And below we have mentioned the bug identifiers:-

  • CVE-2021-30554 (High Severity) (0-Day flaw)
  • CVE-2021-30555 (High Severity)
  • CVE-2021-30556 (High Severity)
  • CVE-2021-30557 (High Severity)

No Key Details

This new zero-day vulnerability (CVE-2021-30554) exists in WebGL, and it’s a post-release vulnerability. In short, this 0-day vulnerability is a use-after-free in the Web Graphics Library (WebGL) JavaScript API that is used to render interactive 2D and 3D graphics without using plugins by Chrome.

Experts at Google have claimed that an attack program targeting this Chrome 0-Day vulnerability has already been circulated in the wild. 

However, for now, being Google has not yet disclosed any key details of this vulnerability, and allowed access to it only to specific researchers in order to allow users time to implement the patches.

Google stated that “Access to the information about these vulnerabilities will be restricted until the maximum numbers of users are updating their old Chrome browser. But, if a bug exists in a third-party library that other projects depend on in a similar way, and it has not yet been fixed, then definitely we can stick to the alike restrictions.”

Apart from this, the successful exploitation of this flaw may lead to the execution of arbitrary code on the computers of users with vulnerable versions of the Chrome browser.

Previously Fixed Flaws

The flaws that are previously fixed by Google are mentioned below:-

  • CVE-2021-21148
  • CVE-2021-21166
  • CVE-2021-21193
  • CVE-2021-21220
  • CVE-2021-21224
  • CVE-2021-30551

Moreover, Google has claimed that they are already aware of CVE-2021-30554 attacks, but, the company traditionally does not provide any information about these incidents.

But, the security analysts have strongly recommended all the users to update their Google Chrome to the latest version to mitigate these threats.

Google Chrome will automatically upgrade the browser when you launch the program, You can perform a manual update by going to Settings > Help > ‘About Google Chrome.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CYREBRO’s AI-Native MDR Platform Earns Silver at the 2025 Globee Cybersecurity Awards

CYREBRO, the AI-native Managed Detection and Response (MDR) solution, announced today that it won...

Aptori Now on Google Cloud Marketplace for AI-Powered Security and Automated Risk Remediation

Aptori’s AI-Driven AppSec Platform Proactively Eliminates Vulnerabilities to Minimize Risk and Ensure Compliance.Aptori, a...

MirrorFace APT Using Custom Malware To Exploited Windows Sandbox & Visual Studio Code

The cybersecurity landscape witnessed a significant development when the National Police Agency (NPA) and...

CISA Issues Advisory on Windows NTFS Flaw Enabling Local Code Execution

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory regarding a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Warns Chromecast Owners Against Factory Reset

Google has issued a warning to Chromecast owners regarding the potential risks of performing...

Latest Chrome Update Addresses Multiple High-Risk Security Issues

Google has released a critical update for its Chrome browser, advancing the stable channel...

Activating Incognito Mode in RDP to Erase All Traces

The Remote Desktop Protocol (RDP) is a widely used tool for remote access, but...