Saturday, June 14, 2025
HomeChromeGoogle Chrome High-Severity Zero-Day Flaw Exploited in The Wild - Emergency Patch!!

Google Chrome High-Severity Zero-Day Flaw Exploited in The Wild – Emergency Patch!!

Published on

SIEM as a Service

Follow Us on Google News

In response to the active exploit of an open high-severity zero-day vulnerability (CVE-2022-4262) in the Chrome web browser, Google has released an emergency security patch to address the issue.

Actively exploited Chrome zero-day vulnerability that allows attackers to execute an arbitrary code to take full control of the system remotely using the exploit that exists in the Wild.

Since the beginning of the year, Chrome has patched a total of nine zero-day vulnerabilities, including this one that was exploited in the wild. As a security patch, Google released Chrome 108.0.5359.94/.95 for the following major platforms:-

- Advertisement - Google News
  • Windows
  • Mac
  • Linux

In the wild, an exploit for CVE-2022-4262 has been reported, and Google is aware of all these reports. As of now, Stable Desktop channel users have started to receive the new version as part of the rolling-out process. Within a few days or a few weeks, it will be reached by the entire user base.

Zero-Day Flaw Profile

  • CVE ID: CVE-2022-4262
  • Severity: High
  • Description: Type Confusion in V8
  • Reporting: It was reported on 2022-11-29

Successful exploitation of this zero-day bug leads to crashes of the browser by reading or writing memory out of buffer bounds.

V8, the open-source Google JavaScript engine written in C++ that powers both Chrome and other Chromium-based browsers* is an especially attractive target for attackers.

A type confusion vulnerability let the exploit to allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.

“Access to bug details and links may be kept restricted until a majority of users are updated with a fix.”

“We will also retain restrictions if the bug exists in a third-party library that other projects similarly depend on, but haven’t yet fixed.

“Google is aware that an exploit for CVE-2022-4262 exists in the wild.” Google Stated.

Zero-days Fixed In 2022

Here below we have mentioned all the zero-day vulnerabilities that are detected and fixed in 2022:-

Update now

Upon checking our systems for available updates, we immediately detected this update and it was immediately distributed to our systems. 

So, if you want to update your Chrome too then follow the simple steps that we have mentioned below:-

  • First of all, you have to select the Chrome menu.
  • Then select the Help option.
  • After that, you have to select the About Google Chrome option.
  • Now, wait for a few seconds, as Chrome will now automatically detect and download if there is any update available.

Moreover, Google has strongly recommended all users to immediately update their chrome in order to prevent any exploitation in the wild.

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...