Sunday, June 15, 2025
HomeChromeWarning!! Google Chrome 0-Day Bug Exploited in Wide - Update Now!

Warning!! Google Chrome 0-Day Bug Exploited in Wide – Update Now!

Published on

SIEM as a Service

Follow Us on Google News

Google released a new version of Chrome 103.0.5060.114, a stable chennal update with the fixes of security vulnerabilities, including a Zero-day bug that was exploited wide by unknown threat actors.

Chrome 103 was released with the fixed for 4 security vulnerabilities reported by external security researchers.

CVE-2022-2294, a Heap-based buffer overflow zero-day bug allows attackers to execute an arbitrary code remotely and bypass the protection mechanism, additionally, it leads to DoS: Crash, Exit, or Restart the affected system.

- Advertisement - Google News

“A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc()”. mitre explains.

Here are the other bugs that were fixed in this new security update:

  • High CVE-2022-2294: Heap buffer overflow in WebRTC.
  • High CVE-2022-2295: Type Confusion in V8. Reported by avaue and Buff3tts at S.S.L.
  • High CVE-2022-2296: Use after free in Chrome OS Shell. Reported by Khalil Zhani

The Zero-day bug affected both Windows and Android versions and the bug was reported by Jan Vojtesek from the Avast Threat Intelligence team.

The attacker behind this exploit is still unknown. Google says this zero-day vulnerability was exploited in the wild and does not yet share technical details or any info regarding these incidents.

Chrome 103.0.5060.114 Update:

Users can update the new version of chrome by checking Chrome menu > Help > About Google Chrome, where it will check auto-update and request you to relaunch the browser after the patch gets downloaded.

As Google Confirms that the bug is active under attack, Users are urged to update chrome immediately to apply the patch.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected

On June 12, 2025, concurrent infrastructure failures at Cloudflare and Google caused widespread service...

AitM Phishing Attacks on Microsoft 365 and Google Aimed at Stealing Login Credentials

A dramatic escalation in phishing attacks leveraging Adversary-in-the-Middle (AiTM) techniques has swept across organizations...

Google Vulnerability Allowed Hackers to Access User Phone Numbers

A security researcher has disclosed a critical vulnerability in Google's account recovery system that...