Monday, May 5, 2025
HomeChromeNew Google Chrome Zero-day Exploited in the Wild, Patch Now!

New Google Chrome Zero-day Exploited in the Wild, Patch Now!

Published on

SIEM as a Service

Follow Us on Google News

Google has issued an urgent security update for its Chrome browser after discovering a zero-day vulnerability that is currently being exploited by attackers.

The vulnerability, tracked as CVE-2024-4761, affects the V8 JavaScript engine and could potentially allow attackers to execute arbitrary code on the user’s computer.

Google has responded quickly with a patch, urging all users to update their browsers immediately to the latest version to protect against potential attacks.

- Advertisement - Google News

Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

CVE-2024-4761: Details of the Vulnerability

This vulnerability stems from an out-of-bounds write in V8, the JavaScript engine used by Google Chrome.

Such a flaw can be exploited by attackers to execute arbitrary code remotely on a victim’s machine, potentially leading to unauthorized access or control over the affected system.

In response to the discovery of the exploit, Google has updated Chrome across various platforms:

  • Mac and Windows: The Stable channel has been updated to versions 124.0.6367.207 and 124.0.6367.208.
  • Linux: The Stable channel has been updated to version 124.0.6367.207.
  • Extended Stable Channel: Both Mac and Windows versions have been updated to 124.0.6367.207.

These updates are rolling out over the coming days and weeks. Users are advised to check their Chrome version and update immediately to the latest release to prevent any potential risk of exploitation.

Google has acknowledged the severity of the vulnerability and is taking steps to ensure that a majority of users receive the update as soon as possible.

Access to detailed bug reports and links will remain restricted until it is confirmed that a significant number of users have implemented the patch.

This measure is to prevent the further spread of the exploit.

Google also expressed gratitude to the security researchers who helped identify and address the vulnerability before it could affect more users.

The tech giant continues to encourage the community to report any new issues and participate in maintaining Chrome’s security integrity through its bug reporting system and community help forums.

On-Demand Webinar to Secure the Top 3 SME Attack Vectors: Watch for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000

A newly discovered dark web listing claims to sell a critical SS7 protocol exploit...

Chimera Malware: Outsmarting Antivirus, Firewalls, and Human Defenses

X Business, a small e-commerce store dealing in handmade home décor, became the latest...

MediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets

MediaTek, a leading provider of chipset technology for smartphones, tablets, AIoT, and smart TVs,...

xAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMs

An employee at Elon Musk’s artificial intelligence venture, xAI, inadvertently disclosed a sensitive API...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000

A newly discovered dark web listing claims to sell a critical SS7 protocol exploit...

Chimera Malware: Outsmarting Antivirus, Firewalls, and Human Defenses

X Business, a small e-commerce store dealing in handmade home décor, became the latest...

MediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets

MediaTek, a leading provider of chipset technology for smartphones, tablets, AIoT, and smart TVs,...