Google Chrome 122 Update Addresses Critical Security Vulnerabilities

Google has recently unveiled Chrome 122, a significant milestone for the widely used web browser.

The most recent release, compatible with Windows, Mac, and Linux operating systems, includes a set of crucial security patches and novel functionalities that enrich the user’s experience and guarantee their safety.

Chrome version 122 addresses critical vulnerabilities and raises the bar for browser security standards.

It introduces advanced security features designed to prevent attackers from exploiting vulnerabilities in the browser, ensuring a more secure browsing experience for users.

Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks .

Google Chrome 122 Critical Security Fixes

Chrome version 122 comes with significant security enhancements. This update addresses 12 security vulnerabilities, some classified as highly critical.

  • CVE-2024-1669: Out-of-bounds memory access in Blink.
  • CVE-2024-1670: Use after free in Mojo.
  • CVE-2024-1671: Inappropriate implementation in Site Isolation.
  • CVE-2024-1672: Inappropriate implementation in Content Security Policy.
  • CVE-2024-1673: Use after free in Accessibility.
  • CVE-2024-1674: Inappropriate implementation in Navigation.
  • CVE-2024-1675: Need for more policy enforcement in Download.
  • CVE-2024-1676: Inappropriate implementation in Navigation.

The security updates implemented involved fixing various vulnerabilities, such as out-of-bounds memory access in Blink and addressing use-after-free errors in Mojo and Accessibility, along with other similar issues.

Google has acknowledged the researchers who discovered the vulnerabilities, showing their commitment to working closely with the cybersecurity community to enhance Chrome’s security.

Chrome version 122 has advanced security features and significant enhancements over its predecessors.

The latest version is available globally across all major operating systems, including Windows, Mac, and Linux.

The update will be gradually rolled out to users over the next few days or weeks, depending on their location and device.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hackers Distributing Phishing Malware Via SVG Format To Bypass File Detection

Cybersecurity experts at the AhnLab Security Intelligence Center (ASEC) have uncovered a novel phishing malware…

1 hour ago

CrushFTP Vulnerability Lets Hackers Bypass Security and Seize Server Control

A newly disclosed authentication bypass vulnerability (CVE-2025-2825) in CrushFTP file transfer software enables attackers to…

2 hours ago

New Android Malware “TsarBot” Targeting 750 Banking, Finance & Crypto Apps

A newly identified Android malware, dubbed TsarBot, has emerged as a potent cyber threat targeting…

2 hours ago

Apache Tomcat Vulnerability Exploited to Execute Malicious Arbitrary Code on Servers

A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-24813, is being actively exploited in…

2 hours ago

Water Gamayun Hackers Exploit MSC EvilTwin Zero-day Vulnerability to Hack Windows Machine

Water Gamayun, a suspected Russian threat actor, has been identified exploiting the MSC EvilTwin zero-day…

2 hours ago

CISA Warns of RESURGE Malware Exploiting Ivanti Connect Secure RCE Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a detailed Malware Analysis Report (MAR-25993211-r1.v1)…

2 hours ago