Tuesday, January 14, 2025
HomeChromeGoogle Released a Patch for Chrome Zero-day Vulnerability That Actively Exploited in...

Google Released a Patch for Chrome Zero-day Vulnerability That Actively Exploited in Wide

Published on

Google Chrome issued an emergency patch to fix 3-high security vulnerabilities including a zero-day bug that actively exploited in wild.

All the vulnerabilities are patched with Chrome version 80.0.3987.122 and the update is available for Windows, Mac, and Linux users.

Technical details of the vulnerability were not disclosed and all the versions of the chrome before 80.0.3987.122 are affected.

3-High Security Vulnerabilities

Integer overflow in ICU

The vulnerability allows a remote attacker to trigger an integer overflow of ICU, results in DoS condition and possibly attacker can execute code on the target vulnerable machine.

CVE-2020-6407: Out of bounds memory access

The error in processing the input streams results in Out of bounds memory access vulnerability. The vulnerability allows a remote attacker to read the information from a memory location or possibly cause a crash.

CVE-2020-6418: Type confusion

The type confusion vulnerability that resides in the V8 component of Chrome’s open-source JavaScript and Web Assembly engine.

A remote attacker can exploit the vulnerability, successful exploitation of the vulnerability allows attackers to gain complete control, over the system.

This is the vulnerability exploited by the attackers in the wild. Users are recommended to update with the latest version of Chrome.

Chrome already patched a Zero-day Bug that was exploited in the wild. Threat actors use the Zero-day Bug to launch various attacks such as spear-phishing, malware, backdoors to attack various financial organizations around the world.

Follow us on Twitter, Linkedin, Facebook for Daily cyber security & hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical macOS Vulnerability Lets Hackers to Bypass Apple’s System Integrity Protection

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that allowed attackers to bypass...

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

Microsoft Warns of MFA Issue Affecting Microsoft 365 users

Microsoft has issued a warning regarding an ongoing issue with Multi-Factor Authentication (MFA) that...

RedCurl APT Deploys Malware via Windows Scheduled Tasks Exploitation

Researchers identified RedCurl APT group activity in Canada in late 2024, where the attackers...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PoC Exploit Released for Critical macOS Sandbox Vulnerability (CVE-2024-54498)

A proof-of-concept (PoC) exploit has been publicly disclosed for a critical vulnerability impacting macOS...

IBM Robotic Process Automation Vulnerability Let Attackers Obtain Sensitive Data

A newly disclosed security vulnerability in IBM Robotic Process Automation (RPA) has raised concerns about potential...

IBM Watsonx.ai Vulnerability Let Attackers Trigger XSS Attacks

A recently disclosed vulnerability, identified as CVE-2024-49785, has been found in IBM watsonx.ai, including its...