Sunday, March 16, 2025
HomeGoogleGoogle Released Chrome 90 With The Fixes Of Zero-Day Flaw - Update...

Google Released Chrome 90 With The Fixes Of Zero-Day Flaw – Update Your Chrome Immediately

Published on

SIEM as a Service

Follow Us on Google News

Google launched the new version of Chrome (Chrome 90) recently for Windows, Mac, and Linux platforms. After the release, researchers claimed that this recent update incorporates fixes for seven security flaws.

The incorporated fixes also include a zero-day flaw that the company claims has already been exploited. The experts affirmed that CVE-2021-21224 is the fourth zero-day Chrome vulnerability that was discovered in 2021.

This vulnerability was spotted on April 5, 2021, by one of the IT security researcher Jose Martinez. This vulnerability is quite confusing and hazardous, as it continued lack of indicators of compromise or any meaningful information regarding attacks.

Zero-day Vulnerability

The zero-day vulnerability is tracked as CVE-2021-21224, and it is described as an input mismatch by the experts in the V8 rendering engine. This zero-day vulnerability had been corrected in JavaScript V8, but it was not present in the latest version of Chromium.

Along with this zero-day vulnerability, the threat actors could easily execute arbitrary code on victims’ systems. Moreover, rather than a zero-day flaw, the new release also fixes other severe security loopholes.

Moreover, Google also specifically listed the four high-severity vulnerabilities whose fixes were contributed by the external cybersecurity researchers.

Bugs Fixed

Below we have mentioned a list of bugs that were fixed in this new version of Google Chrome:-

  • CVE-2021-21222 (Severity: High) 
  • CVE-2021-21223 (Severity: High)
  • CVE-2021-21224 (Severity: High)
  • CVE-2021-21225 (Severity: High)
  • CVE-2021-21226 (Severity: High)

Update Your Chrome ASAP

The Zero-day vulnerability is very dangerous; that’s why Google suggests that users must go to the ‘Settings —> About Chrome’ page to manually complete the update check procedure.

The new version of the Google Chrome browser (Chrome 90) essentially brings the developments and different changes on the security side, along with the priority opening of HTTPS pages.

Once the users are done with the automatic download and installation procedure, Chrome will eventually ask whether to restart the application to execute the update or not.

In case if any users have automatic updates enabled, then they don’t have to worry, as their Chrome will automatically update itself. Moreover, as we told earlier that one can easily update their browser by opening the About Google Chrome option from the menu bar.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

North Korean Hackers Use Google Play Malware to Steal SMS, Calls & Screenshots

Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated Android surveillance tool dubbed...

Google Warns Chromecast Owners Against Factory Reset

Google has issued a warning to Chromecast owners regarding the potential risks of performing...

Blind Eagle Hackers Exploit Google Drive, Dropbox & GitHub to Evade Security Measures

In a recent cyber campaign, the notorious threat actor group Blind Eagle, also known...