Friday, June 13, 2025
HomeChromeWarning!! New Chrome 0-Day Bug Being Exploited In The Wild

Warning!! New Chrome 0-Day Bug Being Exploited In The Wild

Published on

SIEM as a Service

Follow Us on Google News

Google Chrome released a new security update for Windows, Linux & Mac users and an update for a new high severity Zero-day bug that is being actively exploited wild by unknown threat actors.

Chrome 104 was released with the fixes of 11 security vulnerabilities, including one critical severity bug and six high severity bugs reported by the Google Project Zero Team and external security researchers.

A Critical Use after free bug(CVE-2022-2852) Reported by Sergei Glazunov of Google Project Zero in Federated Credential Management API (FedCM) Let hackers allow take over the system remotely.

- Advertisement - Google News

A high severity Zero-day bug CVE-2022-2856 allows Insufficient validation of untrusted input in Intents that was reported by Ashley Shen and Christian Resell of Google Threat Analysis Group has exploited wild.

This is the 5th Zero-day Bug that was uncovered this year, Chrome users are urged to update their browsers immediately.

Vulnerability Details:

CVE-2022-2852:  Use after free in FedCM  – Critical
CVE-2022-2854: Use after free in SwiftShader – High
CVE-2022-2855: Use after free in ANGLE  – High
CVE-2022-2857: Use after free in Blink  – High
CVE-2022-2858: Use after free in Sign-In Flow   – High
CVE-2022-2853: Heap buffer overflow in Downloads  – High
CVE-2022-2856: Insufficient validation of untrusted input in Intents  – High (Exploited Wild)
CVE-2022-2859: Use after free in Chrome OS Shell – Medium 
CVE-2022-2860: Insufficient policy enforcement in Cookies -Medium 
CVE-2022-2861: Inappropriate implementation in Extensions API – Medium 

According to the Google release report “The Stable channel has been updated to 104.0.5112.101 for Mac and Linux and 104.0.5112.102/101 for Windows which will roll out over the coming days/weeks. The extended stable channel has been updated to 104.0.5112.101 for Mac and 104.0.5112.102 for Windows, which will roll out over the coming days/weeks”

To upgrade your old Chrome, then you have to follow a few simple steps that we have mentioned below:-

  • First of all, you have to go to Settings.
  • Then click on the Help option.
  • After that, you have to select the About Google Chrome option.
  • That’s it, now your browser will automatically check for the new update and install it.

Also Read: Download Free Secure Web Filtering – E-book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware

Recent investigations by Check Point Research have uncovered a sophisticated malware campaign that leverages...

Threat Actors Exploit DeepSeek-R1 Popularity to Target Windows Device Users

A new, highly sophisticated cyberattack campaign is targeting users seeking to download the popular...

OpenPGP.js Vulnerability Allows Attackers to Bypass Message Signature Verification

A critical vulnerability in OpenPGP.js, a widely used JavaScript library for encrypted messaging and...

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT

A newly discovered remote access trojan (RAT) named CyberEye is making waves in the cybersecurity community...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware

Recent investigations by Check Point Research have uncovered a sophisticated malware campaign that leverages...

Threat Actors Exploit DeepSeek-R1 Popularity to Target Windows Device Users

A new, highly sophisticated cyberattack campaign is targeting users seeking to download the popular...

OpenPGP.js Vulnerability Allows Attackers to Bypass Message Signature Verification

A critical vulnerability in OpenPGP.js, a widely used JavaScript library for encrypted messaging and...