Thursday, February 27, 2025
HomeChromeGoogle Chrome 122 Update Addresses Critical Security Vulnerabilities

Google Chrome 122 Update Addresses Critical Security Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Google has recently unveiled Chrome 122, a significant milestone for the widely used web browser.

The most recent release, compatible with Windows, Mac, and Linux operating systems, includes a set of crucial security patches and novel functionalities that enrich the user’s experience and guarantee their safety.

Chrome version 122 addresses critical vulnerabilities and raises the bar for browser security standards.

It introduces advanced security features designed to prevent attackers from exploiting vulnerabilities in the browser, ensuring a more secure browsing experience for users.

Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

Google Chrome 122 Critical Security Fixes

Chrome version 122 comes with significant security enhancements. This update addresses 12 security vulnerabilities, some classified as highly critical.

  • CVE-2024-1669: Out-of-bounds memory access in Blink.
  • CVE-2024-1670: Use after free in Mojo.
  • CVE-2024-1671: Inappropriate implementation in Site Isolation.
  • CVE-2024-1672: Inappropriate implementation in Content Security Policy.
  • CVE-2024-1673: Use after free in Accessibility.
  • CVE-2024-1674: Inappropriate implementation in Navigation.
  • CVE-2024-1675: Need for more policy enforcement in Download.
  • CVE-2024-1676: Inappropriate implementation in Navigation.

The security updates implemented involved fixing various vulnerabilities, such as out-of-bounds memory access in Blink and addressing use-after-free errors in Mojo and Accessibility, along with other similar issues.

Google has acknowledged the researchers who discovered the vulnerabilities, showing their commitment to working closely with the cybersecurity community to enhance Chrome’s security.

Chrome version 122 has advanced security features and significant enhancements over its predecessors.

The latest version is available globally across all major operating systems, including Windows, Mac, and Linux.

The update will be gradually rolled out to users over the next few days or weeks, depending on their location and device.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...