Sunday, April 13, 2025
HomeChromeWarning!! New Chrome 0-Day Bug Being Exploited In The Wild

Warning!! New Chrome 0-Day Bug Being Exploited In The Wild

Published on

SIEM as a Service

Follow Us on Google News

Google Chrome released a new security update for Windows, Linux & Mac users and an update for a new high severity Zero-day bug that is being actively exploited wild by unknown threat actors.

Chrome 104 was released with the fixes of 11 security vulnerabilities, including one critical severity bug and six high severity bugs reported by the Google Project Zero Team and external security researchers.

A Critical Use after free bug(CVE-2022-2852) Reported by Sergei Glazunov of Google Project Zero in Federated Credential Management API (FedCM) Let hackers allow take over the system remotely.

- Advertisement - Google News

A high severity Zero-day bug CVE-2022-2856 allows Insufficient validation of untrusted input in Intents that was reported by Ashley Shen and Christian Resell of Google Threat Analysis Group has exploited wild.

This is the 5th Zero-day Bug that was uncovered this year, Chrome users are urged to update their browsers immediately.

Vulnerability Details:

CVE-2022-2852:  Use after free in FedCM  – Critical
CVE-2022-2854: Use after free in SwiftShader – High
CVE-2022-2855: Use after free in ANGLE  – High
CVE-2022-2857: Use after free in Blink  – High
CVE-2022-2858: Use after free in Sign-In Flow   – High
CVE-2022-2853: Heap buffer overflow in Downloads  – High
CVE-2022-2856: Insufficient validation of untrusted input in Intents  – High (Exploited Wild)
CVE-2022-2859: Use after free in Chrome OS Shell – Medium 
CVE-2022-2860: Insufficient policy enforcement in Cookies -Medium 
CVE-2022-2861: Inappropriate implementation in Extensions API – Medium 

According to the Google release report “The Stable channel has been updated to 104.0.5112.101 for Mac and Linux and 104.0.5112.102/101 for Windows which will roll out over the coming days/weeks. The extended stable channel has been updated to 104.0.5112.101 for Mac and 104.0.5112.102 for Windows, which will roll out over the coming days/weeks”

To upgrade your old Chrome, then you have to follow a few simple steps that we have mentioned below:-

  • First of all, you have to go to Settings.
  • Then click on the Help option.
  • After that, you have to select the About Google Chrome option.
  • That’s it, now your browser will automatically check for the new update and install it.

Also Read: Download Free Secure Web Filtering – E-book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...