Categories: Chrome

Hackers Actively Exploited A Critical Chrome 0-Day Vulnerability In Wide – Update Your Chrome Now!!

Recently, to fix four new vulnerabilities Google updated its Chrome browser to the new version, “91.0.4472.114.” Among those four vulnerabilities, the security experts identified a critical 0-day vulnerability that is being exploited widely by hackers.

The security researchers have marked the 0-day flaw as CVE-2021-30554, and this is the second Chrome 0-day flaw that is patched by Google this month, while this year it’s the seventh one that’s being exploited before patching.

While this Chrome 0-Day vulnerability CVE-2021-30554 was actually reported by an anonymous user, and that’s why the bug reward for this bug also remains undisclosed.

Flaws Detected

Along with the 0-Day vulnerability, in this release, the developers have also fixed three more use-after-free problems in Chrome Sharing, WebAudio, and TabGroups. And below we have mentioned the bug identifiers:-

  • CVE-2021-30554 (High Severity) (0-Day flaw)
  • CVE-2021-30555 (High Severity)
  • CVE-2021-30556 (High Severity)
  • CVE-2021-30557 (High Severity)

No Key Details

This new zero-day vulnerability (CVE-2021-30554) exists in WebGL, and it’s a post-release vulnerability. In short, this 0-day vulnerability is a use-after-free in the Web Graphics Library (WebGL) JavaScript API that is used to render interactive 2D and 3D graphics without using plugins by Chrome.

Experts at Google have claimed that an attack program targeting this Chrome 0-Day vulnerability has already been circulated in the wild. 

However, for now, being Google has not yet disclosed any key details of this vulnerability, and allowed access to it only to specific researchers in order to allow users time to implement the patches.

Google stated that “Access to the information about these vulnerabilities will be restricted until the maximum numbers of users are updating their old Chrome browser. But, if a bug exists in a third-party library that other projects depend on in a similar way, and it has not yet been fixed, then definitely we can stick to the alike restrictions.”

Apart from this, the successful exploitation of this flaw may lead to the execution of arbitrary code on the computers of users with vulnerable versions of the Chrome browser.

Previously Fixed Flaws

The flaws that are previously fixed by Google are mentioned below:-

  • CVE-2021-21148
  • CVE-2021-21166
  • CVE-2021-21193
  • CVE-2021-21220
  • CVE-2021-21224
  • CVE-2021-30551

Moreover, Google has claimed that they are already aware of CVE-2021-30554 attacks, but, the company traditionally does not provide any information about these incidents.

But, the security analysts have strongly recommended all the users to update their Google Chrome to the latest version to mitigate these threats.

Google Chrome will automatically upgrade the browser when you launch the program, You can perform a manual update by going to Settings > Help > ‘About Google Chrome.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

12 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

12 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

15 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

18 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

19 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

19 hours ago