Tuesday, July 23, 2024

Warning!! New Chrome 0-Day Bug Being Exploited In The Wild

Google Chrome released a new security update for Windows, Linux & Mac users and an update for a new high severity Zero-day bug that is being actively exploited wild by unknown threat actors.

Chrome 104 was released with the fixes of 11 security vulnerabilities, including one critical severity bug and six high severity bugs reported by the Google Project Zero Team and external security researchers.

A Critical Use after free bug(CVE-2022-2852) Reported by Sergei Glazunov of Google Project Zero in Federated Credential Management API (FedCM) Let hackers allow take over the system remotely.

A high severity Zero-day bug CVE-2022-2856 allows Insufficient validation of untrusted input in Intents that was reported by Ashley Shen and Christian Resell of Google Threat Analysis Group has exploited wild.

This is the 5th Zero-day Bug that was uncovered this year, Chrome users are urged to update their browsers immediately.

Vulnerability Details:

CVE-2022-2852:  Use after free in FedCM  – Critical
CVE-2022-2854: Use after free in SwiftShader – High
CVE-2022-2855: Use after free in ANGLE  – High
CVE-2022-2857: Use after free in Blink  – High
CVE-2022-2858: Use after free in Sign-In Flow   – High
CVE-2022-2853: Heap buffer overflow in Downloads  – High
CVE-2022-2856: Insufficient validation of untrusted input in Intents  – High (Exploited Wild)
CVE-2022-2859: Use after free in Chrome OS Shell – Medium 
CVE-2022-2860: Insufficient policy enforcement in Cookies -Medium 
CVE-2022-2861: Inappropriate implementation in Extensions API – Medium 

According to the Google release report “The Stable channel has been updated to 104.0.5112.101 for Mac and Linux and 104.0.5112.102/101 for Windows which will roll out over the coming days/weeks. The extended stable channel has been updated to 104.0.5112.101 for Mac and 104.0.5112.102 for Windows, which will roll out over the coming days/weeks”

To upgrade your old Chrome, then you have to follow a few simple steps that we have mentioned below:-

  • First of all, you have to go to Settings.
  • Then click on the Help option.
  • After that, you have to select the About Google Chrome option.
  • That’s it, now your browser will automatically check for the new update and install it.

Also Read: Download Free Secure Web Filtering – E-book


Latest articles

SonicOS IPSec VPN Vulnerability Let Attackers Cause Dos Condition

SonicWall has disclosed a critical heap-based buffer overflow vulnerability in its SonicOS IPSec VPN....

Hackers Registered 500k+ Domains Using Algorithms For Extensive Cyber Attack

Hackers often register new domains for phishing attacks, spreading malware, and other deceitful activities. Such...

Hackers Claim Breach of Daikin: 40 GB of Confidential Data Exposed

Daikin, the world's largest air conditioner manufacturer, has become the latest target of the...

Emojis Are To Express Emotions, But CyberCriminals For Attacks

There are 3,664 emojis that can be used to express emotions, ideas, or objects...

Beware Of Fake Browser Updates That Installs Malicious BOINC Infrastructre

SocGholish malware, also known as FakeUpdates, has exhibited new behavior since July 4th, 2024,...

Data Breach Increases by Over 1,000% Annually

The Identity Theft Resource Center® (ITRC), a nationally recognized nonprofit organization established to support...

UK Police Arrested 17-year-old Boy Responsible for MGM Resorts Hack

UK police have arrested a 17-year-old boy from Walsall in connection with a notorious...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles