Emergency Chrome Update Released to Patch Actively Exploited Zero-Day Bug

Google has announced an emergency update for Chrome (94.0.4606.61), and in this update, it has addressed Chrome’s 11th ‘zero days’ exploit of the year. 

In this emergency update, Google has tracked the zero-day vulnerability as CVE-2021-37973 with High severity and this zero-day vulnerability attacks the users of the following platforms:-

  • Linux
  • macOS
  • Windows

This vulnerability was being used after free in Portals API, and there is a web page navigation system in this vulnerability, that allows a page to display another page as an inset.

Not only this but it also performs a seamless transition to a new state, and in that its formerly-inset pages convert into the top-level document. After knowing about the vulnerability, the Chrome-introduced some update that has been spreading all over the world to Stable desktop channel.

Eleventh zero-day

Google has announced this emergency update after detecting the vulnerability “CVE-2021-37973,” and they have also patched this 11th zero-day vulnerability in the Chrome web browser.

Here’s the list of all zero-day vulnerabilities detected this year:-

  • CVE-2021-21148 – February 4th, 2021
  • CVE-2021-21166 – March 2nd, 2021
  • CVE-2021-21193 – March 12th, 2021
  • CVE-2021-21220 – April 13th, 2021
  • CVE-2021-21224 – April 20th, 2021
  • CVE-2021-30551 – June 9th, 2021
  • CVE-2021-30554 – June 17th, 2021
  • CVE-2021-30563 – July 15th, 2021
  • CVE-2021-30632 – September 13th, 2021
  • CVE-2021-30633 – September 13th, 2021

No key Details were Unveiled regarding Ongoing Attacks

Moreover, Clément Lecigne from Google TAG, with the help of Sergei Glazunov and Mark Brand from Google Project Zero has stated that the zero-day security flaw that has been fixed now was initially published the day when the first Google Chrome 94 stable was released. 

After investigating the whole attack, they claimed that the exploitation of this vulnerability allows the threat actors to implement arbitrary code on computers running unpatched Chrome versions.

However, Google has gone through the details carefully, and they conclude that the vulnerability has been discovered in the wild attacks exploiting CVE-2021-37973.

But they have not yet unveiled any key details of this attack or any steps that were used by the threat actors. 

While the threat actors are attacking Chrome, since it is used by nearly 2.65 billion users all over the world, and many users are connected through it, which makes it is a huge lucrative target for the threat actors to initiate attacks.

Found this article interesting!! Follow us on LinkedinTwitter,  Facebook for daily Cyber Security News & Updates

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Halo Security Launches Slack Integration for Real-Time Alerts on New Assets and Vulnerabilities

Halo Security, a leader in external attack surface management and penetration testing, has announced the…

10 hours ago

Researchers Detailed FrostyGoop Malware Attacking ICS Devices

FrostyGoop, a newly discovered OT-centric malware that exploited Modbus TCP to disrupt critical infrastructure in…

14 hours ago

5 Hackers Charged for Attacking Companies via Phishing Text Messages

Federal authorities have unsealed charges against five individuals accused of orchestrating sophisticated phishing schemes that…

15 hours ago

Two PyPi Malicious Package Mimic ChatGPT & Claude Steals Developers Data

Two malicious Python packages masquerading as tools for interacting with popular AI models ChatGPT and…

17 hours ago

Helldown Ransomware Attacking VMware ESXi And Linux Servers

Helldown, a new ransomware group, actively exploits vulnerabilities to breach networks, as since August 2024,…

18 hours ago

Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay

Threat actors are exploiting a new cash-out tactic called "Ghost Tap" to siphon funds from…

20 hours ago