Saturday, April 13, 2024

Hackers Actively Exploited A Critical Chrome 0-Day Vulnerability In Wide – Update Your Chrome Now!!

Recently, to fix four new vulnerabilities Google updated its Chrome browser to the new version, “91.0.4472.114.” Among those four vulnerabilities, the security experts identified a critical 0-day vulnerability that is being exploited widely by hackers.

The security researchers have marked the 0-day flaw as CVE-2021-30554, and this is the second Chrome 0-day flaw that is patched by Google this month, while this year it’s the seventh one that’s being exploited before patching.

While this Chrome 0-Day vulnerability CVE-2021-30554 was actually reported by an anonymous user, and that’s why the bug reward for this bug also remains undisclosed.

Flaws Detected

Along with the 0-Day vulnerability, in this release, the developers have also fixed three more use-after-free problems in Chrome Sharing, WebAudio, and TabGroups. And below we have mentioned the bug identifiers:-

  • CVE-2021-30554 (High Severity) (0-Day flaw)
  • CVE-2021-30555 (High Severity)
  • CVE-2021-30556 (High Severity)
  • CVE-2021-30557 (High Severity)

No Key Details

This new zero-day vulnerability (CVE-2021-30554) exists in WebGL, and it’s a post-release vulnerability. In short, this 0-day vulnerability is a use-after-free in the Web Graphics Library (WebGL) JavaScript API that is used to render interactive 2D and 3D graphics without using plugins by Chrome.

Experts at Google have claimed that an attack program targeting this Chrome 0-Day vulnerability has already been circulated in the wild. 

However, for now, being Google has not yet disclosed any key details of this vulnerability, and allowed access to it only to specific researchers in order to allow users time to implement the patches.

Google stated that “Access to the information about these vulnerabilities will be restricted until the maximum numbers of users are updating their old Chrome browser. But, if a bug exists in a third-party library that other projects depend on in a similar way, and it has not yet been fixed, then definitely we can stick to the alike restrictions.”

Apart from this, the successful exploitation of this flaw may lead to the execution of arbitrary code on the computers of users with vulnerable versions of the Chrome browser.

Previously Fixed Flaws

The flaws that are previously fixed by Google are mentioned below:-

  • CVE-2021-21148
  • CVE-2021-21166
  • CVE-2021-21193
  • CVE-2021-21220
  • CVE-2021-21224
  • CVE-2021-30551

Moreover, Google has claimed that they are already aware of CVE-2021-30554 attacks, but, the company traditionally does not provide any information about these incidents.

But, the security analysts have strongly recommended all the users to update their Google Chrome to the latest version to mitigate these threats.

Google Chrome will automatically upgrade the browser when you launch the program, You can perform a manual update by going to Settings > Help > ‘About Google Chrome.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Website

Latest articles

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...

Hackers Employ Deepfake Technology To Impersonate as LastPass CEO

A LastPass employee recently became the target of an attempted fraud involving sophisticated audio...

Sisence Data Breach, CISA Urges To Reset Login Credentials

In response to a recent data breach at Sisense, a provider of data analytics...

DuckDuckGo Launches Privacy Pro: 3-in-1 service With VPN

DuckDuckGo has launched Privacy Pro, a new subscription service that promises to enhance user...

Cyber Attack Surge by 28%:Education Sector at High Risk

In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average...

Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive concerning a...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles