Chrome zero day
Author: s | 2025-04-25
Share Chrome zero-day exploited, CISA orders patching. Share Chrome zero-day exploited, CISA orders patching on Facebook; Share Chrome zero-day exploited, CISA orders patching on Twitter; Share Chrome zero-day exploited, CISA orders patching on LinkedIn New Chrome Zero-Day. According to Microsoft researchers, North Korean hackers have been using a Chrome zero-day exploit to steal cryptocurrency. Tags: Chrome, cryptocurrency, Microsoft, North Korea, zero-day. Posted on Septem at
Zero-day Vulnerability in Chrome - Europa
Google has fixed another zero-day vulnerability in the Chrome browser, which was exploited by security researchers during the Pwn2Own hacking contest last month.Tracked as CVE-2024-3159, this high-severity security flaw is caused by an out-of-bounds read weakness in the Chrome V8 JavaScript engine.Remote attackers can exploit the vulnerability using crafted HTML pages to gain access to data beyond the memory buffer via heap corruption, which can provide them with sensitive information or trigger a crash.Palo Alto Networks security researchers Edouard Bochin and Tao Yan demoed the zero-day on the second day of Pwn2Own Vancouver 2024 to defeat V8 hardening.Their double-tap exploit allowed them to execute arbitrary code on Google Chrome and Microsoft Edge, earning them a $42,500 award.Google has now fixed the zero-day in the Google Chrome stable channel version 123.0.6312.105/.106/.107 (Windows and Mac) and 123.0.6312.105 (Linux), which will roll out worldwide over the coming days.One week ago, Google fixed two more Chrome zero-days exploited at Pwn2Own Vancouver 2024. The first, a high-severity type confusion weakness (CVE-2024-2887) in the WebAssembly (Wasm) open standard, was targeted by Manfred Paul's double-tap RCE exploit that targeted both Chrome and Edge.The second, a use-after-free (UAF) weakness in the WebCodecs API (CVE-2024-2886), was also exploited by KAIST Hacking Lab's Seunghyun Lee to gain remote code execution on both Chromium web browsers.Mozilla also patched two Firefox zero-days exploited by Manfred Paul at this year's Pwn2Own Vancouver competition on the same day the bugs were exploited.While both Google and Mozilla released security patches within a week, vendors usually take their time to fix Pwn2Own zero-days since Trend Micro's Zero Day Initiative publicly discloses bug details after 90 days.In total, Google patched four Chrome zero-days this year, with the fourth addressed in January as an actively exploited zero-day (CVE-2024-0519) that enabled attackers to crash unpatched browsers or access sensitive information due to an out-of-bounds memory access weakness in the V8 JavaScript engine.On Tuesday, the company also fixed two Android zero-days exploited by forensic firms to unlock Pixel phones without a PIN and gain access to the data stored within them.
Day Zero Diagnostics Leadership - Day Zero
Google Responds to Chrome Zero-Day Vulnerability CVE-2023-4863, Credits Apple and Citizen Lab for DiscoveryIn a swift action that underscores the perpetual arms race against cyber threats, Google recently launched a crucial update for its Chrome browser, patching the Chrome Zero-Day Vulnerability CVE-2023-4863. This marked the fourth zero-day vulnerability in Chrome that has been addressed this year.What is Chrome Zero-Day Vulnerability CVE-2023-4863?Chrome Zero-Day Vulnerability CVE-2023-4863 is a high-risk, heap buffer overflow issue affecting the WebP component of the browser. WebP is an advanced image format offering enhanced compression and quality, overshadowing its predecessors, JPEG and PNG. Almost all contemporary browsers, like Firefox, Safari, Edge, and Opera, support this image format.For those unfamiliar with the term, a “heap buffer overflow” occurs when an application tries to store more data in a heap-allocated memory buffer than it can actually hold. This can lead to application crashes and possibly open the door for hackers to execute arbitrary code on the victim's system.Google's advisory points out that they are aware that an exploit exists for this vulnerability “in the wild,” making it imperative for users to update their browsers immediately.For a more technical explanation of heap buffer overflow issues, check out this guide.Who Discovered the Vulnerability?The discovery of Chrome Zero-Day Vulnerability CVE-2023-4863 was credited to Apple's Security Engineering and Architecture (SEAR) and Citizen Lab at The University of Toronto’s Munk School. Citizen Lab frequently exposes commercial spyware activities, which leads to the speculation that this vulnerability might have been exploited by one such spyware vendor.A recently disclosed zero day in Chrome browsers
Zero-Day / Browser SecurityGoogle on Friday released out-of-band updates to resolve an actively exploited zero-day flaw in its Chrome web browser, making it the first such bug to be addressed since the start of the year.Tracked as CVE-2023-2033, the high-severity vulnerability has been described as a type confusion issue in the V8 JavaScript engine. Clement Lecigne of Google's Threat Analysis Group (TAG) has been credited with reporting the issue on April 11, 2023."Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page," according to the NIST's National Vulnerability Database (NVD).The tech giant acknowledged that "an exploit for CVE-2023-2033 exists in the wild," but stopped short of sharing additional technical specifics or indicators of compromise (IoCs) to prevent further exploitation by threat actors.CVE-2023-2033 also appears to share similarities with CVE-2022-1096, CVE-2022-1364, CVE-2022-3723, and CVE-2022-4262 – four other actively abused type confusion flaws in V8 that were remediated by Google in 2022.Google closed out a total of nine zero-days in Chrome last year. The development comes days after Citizen Lab and Microsoft disclosed the exploitation of a now-patched flaw in Apple iOS by customers of a shadowy spyware vendor named QuaDream to target journalists, political opposition figures, and an NGO worker in 2021.It also comes within a week of Apple releasing updates to patch two actively exploited zero-day vulnerabilities (CVE-2023-28205 and CVE-2023-28206) in iOS, iPadOS, macOS, and Safari web browser that could lead to arbitrary code execution.Users are recommended to upgrade to version 112.0.5615.121 for Windows, macOS, and Linux to mitigate potential threats. Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.. Share Chrome zero-day exploited, CISA orders patching. Share Chrome zero-day exploited, CISA orders patching on Facebook; Share Chrome zero-day exploited, CISA orders patching on Twitter; Share Chrome zero-day exploited, CISA orders patching on LinkedInGoogle Fixes Chrome Zero-Day Flaw
Google has released Chrome 91.0.4472.101 for Windows, Mac, and Linux to fix 14 security vulnerabilities, with one zero-day vulnerability exploited in the wild and tracked as CVE-2021-30551.Google Chrome 91.0.4472.101 has started rolling out worldwide and will become available to all users over the next few days.Google Chrome will automatically attempt to upgrade the browser the next time you launch the program, but you can perform a manual update by going to Settings > Help > 'About Google ChromeGoogle updated to version 91.0.4472.10Six Chrome zero-days exploited in the wild in 2021Few details regarding today's fixed zero-day vulnerability are currently available other than that it is a type confusion bug in V8, Google's open-source and C++ WebAssembly and JavaScript engine.The vulnerability was discovered by Sergei Glazunov of Google Project Zero and is being tracked as CVE-2021-30551.Google states that they are "aware that an exploit for CVE-2021-30551 exists in the wild."Shane Huntley, Director of Google's Threat Analysis Group, says that this zero-day was utilized by the same threat actors using the Windows CVE-2021-33742 zero-day fixed yesterday by Microsoft.Chrome in-the-wild vulnerability CVE-2021-30551 patched today was also from the same actor and targeting.Thanks to Chrome team for also patching within 7 days. Shane Huntley (@ShaneHuntley) June 9, 2021Today's update fixes Google Chrome's sixth zero-day exploited in attacks this year, with the other five listed below:CVE-2021-21148 - February 4th, 2021 CVE-2021-21166 - March 2nd, 2021 CVE-2021-21193 - March 12th, 2021 CVE-2021-21220 - April 13th, 2021 CVE-2021-21224 - April 20th, 2021 In addition to these vulnerabilities, news broke yesterday of a threat actor group known as Puzzlemaker that is chaining together Google Chrome zero-day bugs to escape the browser's sandbox and install malware in Windows."Once the attackers have used both the Chrome and Windows exploits to gain a foothold in the targeted system, the stager module downloads and executes a more complex malware dropper from a remote server," the researchers said.Microsoft fixed the Windows vulnerabilities yesterday as part of the June 2021 Patch Tuesday, but Kaspersky could not determine what Google Chrome vulnerabilities were used in the Puzzlemaker attacks.Kaspersky believes the attackers may have been using theGoogle Chrome ออกอัปเดตอุดช่องโหว่ Zero-day ตัวใหม่
Of zero-day vulnerabilities underscores the ever-evolving threat landscape and the necessity for timely updates and patches.For a detailed timeline of zero-day vulnerabilities, you can visit this resource.ConclusionChrome Zero-Day Vulnerability CVE-2023-4863 is a glaring example of the constant cat-and-mouse game between cybersecurity experts and cybercriminals. As users, the best defense against such threats is to keep software and applications up-to-date. Always be wary of advisories from reputable sources and act upon them promptly to keep your digital environment secure.For more tips on securing your online browsing experience, check out this guide.By being proactive in our approach to cybersecurity, we can make it increasingly challenging for cybercriminals to exploit vulnerabilities, thereby contributing to a safer online community for everyone.FAQWhat is Chrome Zero-Day Vulnerability CVE-2023-4863?This is a critical severity vulnerability identified in Google Chrome, specifically a heap buffer overflow issue in the WebP component. Google has released an emergency security update to address this vulnerability.Who discovered this vulnerability?The vulnerability was reported by Apple Security Engineering and Architecture (SEAR) and The Citizen Lab at The University of Toronto's Munk School.Why is this vulnerability considered ‘critical'?Heap buffer overflow issues can allow attackers to crash an application and potentially execute arbitrary code, thus severely compromising user security.How many zero-day vulnerabilities have been found in Chrome this year?CVE-2023-4863 is the fourth zero-day vulnerability that Google has patched in Chrome in the year 2023.What is WebP?WebP is an image format that offers better compression and quality compared to JPEG and PNG formats. It's supported by all modern browsers,Google Fixes Critical Chrome Zero Day
Recently, Google released an emergency security update to fix another Chrome zero-day vulnerability actively exploited in the wild. This zero-day flaw has been tracked as CVE-2023-2136 and is the second zero-day vulnerability found this year.In this case, the most exciting development is that Google knows a working exploit for CVE-2023-2136 is already available in the wild.While Google releases this update through Stable Channel Update for all the major platforms, and here we have mentioned them accordingly:-Windows: 112.0.5615.137/138Mac: 112.0.5615.137 Linux: 112.0.5615.165This new emergency update from Google for Chrome comes with eight bug fixes. High CVE-2023-2133: Out-of-bounds memory access in Service Worker API. Reported by Rong Jian of VRI on 2023-03-30High CVE-2023-2134: Out-of-bounds memory access in Service Worker API. Reported by Rong Jian of VRI on 2023-03-30High CVE-2023-2135: Use after free in DevTools. Reported by Cassidy Kim(@cassidy6564) on 2023-03-14High CVE-2023-2136: Integer overflow in Skia. Reported by Clément Lecigne of Google’s Threat Analysis Group on 2023-04-12 (Zero Day)Medium CVE-2023-2137: Heap buffer overflow in SQLite. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research Institute on 2023-04-05Besides this, Google asserted that the stable release will soon be available to all users of the above-mentioned platforms in the coming few days or weeks.Second Google Chrome Zero-Day Bug of this yearThis newly detected vulnerability is the second Google Chrome zero-day flaw found this year and has been actively exploited in the wild.Here below, we have mentioned the details of both zero-day vulnerabilities found this year:-Here the first one:-CVE ID: CVE-2023-2033Description: It’s a type of Confusion in V8.Severity: HIGHReporting: It has been reported by Clément Lecigne of Google’s Threat Analysis Group on 2023-04-11.Here the second one:-CVE ID: CVE-2023-2136 Description: It’s an integer overflow in Skia.Severity: HIGHReporting: It has been reported by Clément Lecigne of Google’s Threat Analysis Group on 2023-04-12.Skia, a widely-used open-source 2D graphics library owned by Google and written in C++, has been found to contain this critical vulnerability (CVE-2023-2136). This high-severity vulnerability involves an integer overflow and has the potential to cause significant harm to the affected systems.Skia is an essential component of Chrome’s rendering pipeline, as it offers a wide range of APIs that enable the browser to render:-GraphicsShapesTextAnimationsImages All these features make it a powerful tool for developers, enabling them to create stunning web experiences and deliver high-quality graphics across multiple platforms.Among the most common software vulnerabilities, integer overflow bugs arise when a given operation generates a value that surpasses the maximum limit for the particular integer type being used. Such incidents frequently lead to unintended software behavior, often presenting security threats that can expose the system to unauthorized access or malicious attacks.“Google is aware that an exploit for CVE-2023-2136 exists in the wild.” Google said.Besides, Google has not provided further details in the brief to give the users time to patch their vulnerable Chrome versions. Not only that, doing so will also prevent any further exploitation. To address the actively exploited security issue, the following are the steps that you need to follow to start the manual process ofUpdate now, there’s a Chrome zero-day in the wild
Google has released an urgent update for its popular Chrome web browser. The update fixes a critical zero-day vulnerability that malicious attackers are actively exploiting. The vulnerability is considered to be high-risk, and if left unpatched, attackers can gain unauthorized access to sensitive information on affected systems.There is a vulnerability in Chrome’s Visuals component that is being tracked as CVE-2024-4671. The flaw is related to the use-after-free issue and can potentially lead to remote code execution.Google has launched the Chrome 124.0.6367.201/.202 update for users of Windows, Mac, and Linux desktops.Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackersThis new version includes a crucial fix for a zero-day vulnerability, and Google has advised all Chrome users to upgrade to the latest version immediately to minimize the risk of a possible attack.Details about the attacks exploiting CVE-2024-4671 are currently limited. Google has restricted access to bug details until most users have updated with the fix. An anonymous security researcher reported the vulnerability to Google.This marks the sixth Chrome zero-day patched by Google so far in 2024. In April, Google fixed two other zero-day vulnerabilities, CVE-2024-2887 and CVE-2024-2886, that were exploited at the Pwn2Own Vancouver 2024 hacking competition.CVE-2024-2887 was a type of confusion weakness in WebAssembly used as part of a remote code execution exploit, while CVE-2024-2886 was a use-after-free flaw in the WebCodecs API that allowed arbitrary read/write access.Earlier in the year, Google patched CVE-2024-0519, an actively exploited zero-day that allowed attackers to access sensitive information or crash unpatched browsers due to an out-of-bounds memory access weakness in the V8 JavaScript engine.The discovery of yet another actively exploited Chrome zero-day underscores the ongoing security risks posed by web browsers. Attackers are increasingly targeting flaws in browser components and APIs to compromise user systems. Chrome users should promptly apply the latest update and remain vigilant for any signs of compromise.Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide. Share Chrome zero-day exploited, CISA orders patching. Share Chrome zero-day exploited, CISA orders patching on Facebook; Share Chrome zero-day exploited, CISA orders patching on Twitter; Share Chrome zero-day exploited, CISA orders patching on LinkedIn
Chrome Zero-day Vulnerability (CVE- ) Actively
Google's policy states that no bug bounty will be rewarded for this particular flaw.image © 2025. all rights reserved.Why is the Vulnerability Critical?Heap buffer overflow issues like Chrome Zero-Day Vulnerability CVE-2023-4863 are perilous because they can be exploited to bring down an application and potentially provide a gateway for hackers to run arbitrary code. This is particularly alarming when the application in question is a browser, as it serves as a gateway to the Internet and holds a wealth of information, including login credentials and personal data.Also, the fact that Citizen Lab and Apple SEAR were the entities that reported this flaw raises eyebrows. Commercial spyware companies often offer complex exploit chains that include Chrome vulnerabilities, targeting not only desktop users but also Android mobile users.Here is an insightful article on why browser vulnerabilities are a critical issue.Google’s Chrome Patch DetailsGoogle responded by releasing an emergency security update to mitigate Chrome Zero-Day Vulnerability CVE-2023-4863. Chrome users should now look for version 116.0.5845.187 for macOS and Linux, and as versions 116.0.5845.187/.188 for Windows. It is crucial to apply this update as soon as possible to safeguard against potential exploits.To update your Chrome browser, follow these steps.The Landscape of Zero-Day Vulnerabilities in 2023It is worth noting that CVE-2023-4863 is the fourth zero-day vulnerability that Google has addressed in Chrome this year. Earlier, they had patched CVE-2023-3079 (type confusion in the V8 engine) in June and CVE-2023-2033 (type confusion in the V8 engine) and CVE-2023-2136 (integer overflow in Skia) in April. This seriesNew Chrome Zero-Day - Schneier on Security
Pierluigi Paganini September 11, 2023 Google rolled out emergency security updates to address a new Chrome zero-day (CVE-2023-4863) actively exploited in the wild.Google rolled out emergency security updates to address a zero-day vulnerability that has been actively exploited in attacks in the wild since the start of the year.The vulnerability, tracked as CVE-2023-4863, is the fourth actively exploited zero-day fixed by Google in 2023.The flaw CVE-2023-4863 is a critical heap buffer overflow that resides in the WebP. The issue was reported to the IT giant by Apple Security Engineering and Architecture (SEAR) and The Citizen Lab at The University of Torontoʼs Munk School on 2023-09-06.“We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.” reads the announcement made by Google. “Google is aware that an exploit for CVE-2023-4863 exists in the wild.”According to the advisory, the Stable and Extended stable channels have been updated to 116.0.5845.187 for Mac and Linux and 116.0.5845.187/.188 for Windows, which will be released over the coming days/weeks.As usual, Google did not publicly share details of the attacks, however, the fact that the issue was reported by Citizen Lab suggests that the vulnerability may have been exploited in attacks against high-profile individuals such as journalists or dissidents.This year Google already addressed the following actively exploited zero-day flaws in Chrome:CVE-2023-2033 (CVSS score: 8.8) – Type Confusion in V8CVE-2023-2136 (CVSS score: 9.6) – Integer overflow in the Skia graphics libraryCVE-2023-3079 (CVSS score: 8.8) – Type Confusion in V8Follow me on Twitter: @securityaffairs and Facebook and MastodonPierluigi Paganini(SecurityAffairs – hacking, Chrome). Share Chrome zero-day exploited, CISA orders patching. Share Chrome zero-day exploited, CISA orders patching on Facebook; Share Chrome zero-day exploited, CISA orders patching on Twitter; Share Chrome zero-day exploited, CISA orders patching on LinkedIn New Chrome Zero-Day. According to Microsoft researchers, North Korean hackers have been using a Chrome zero-day exploit to steal cryptocurrency. Tags: Chrome, cryptocurrency, Microsoft, North Korea, zero-day. Posted on Septem atChrome Zero-Day Vulnerability (CVE- ) Actively
Today, Google revealed that it patched the tenth zero-day exploited in the wild in 2024 by attackers or security researchers during hacking contests.Tracked as CVE-2024-7965 and reported by a security researcher known only as TheDog, the now-patched high-severity vulnerability is caused by a bug in the compiler backend when selecting the instructions to generate for just-in-time (JIT) compilation.Google describes the vulnerability as an inappropriate implementation in Google Chrome's V8 JavaScript engine that can let remote attackers exploit heap corruption via a crafted HTML page.This was announced in an update to a blog post where the company revealed last week that it had fixed another high-severity zero-day vulnerability (CVE-2024-7971) caused by a V8 type confusion weakness."Updated on 26 August 2024 to reflect the in the wild exploitation of CVE-2024-7965 which was reported after this release," the company said in today's update. "Google is aware that exploits for CVE-2024-7971 and CVE-2024-7965 exist in the wild."Google has fixed both zero-days in Chrome version 128.0.6613.84/.85 for Windows/macOS systems and version 128.0.6613.84 Linux users, which have been rolling out to all users in the Stable Desktop channel since Wednesday.Even though Chrome will automatically update when security patches are available, you can also speed up this process and apply the updates manually by going to the Chrome menu > Help > About Google Chrome, letting the update finish, and clicking the 'Relaunch' button to install it.While Google confirmed that the CVE-2024-7971 and CVE-2024-7965 vulnerabilities have been used in the wild, it has yet to share more information regarding these attacks."Access to bug details and links may be kept restricted until a majority of users are updated with a fix," Google says."We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed."Since the startComments
Google has fixed another zero-day vulnerability in the Chrome browser, which was exploited by security researchers during the Pwn2Own hacking contest last month.Tracked as CVE-2024-3159, this high-severity security flaw is caused by an out-of-bounds read weakness in the Chrome V8 JavaScript engine.Remote attackers can exploit the vulnerability using crafted HTML pages to gain access to data beyond the memory buffer via heap corruption, which can provide them with sensitive information or trigger a crash.Palo Alto Networks security researchers Edouard Bochin and Tao Yan demoed the zero-day on the second day of Pwn2Own Vancouver 2024 to defeat V8 hardening.Their double-tap exploit allowed them to execute arbitrary code on Google Chrome and Microsoft Edge, earning them a $42,500 award.Google has now fixed the zero-day in the Google Chrome stable channel version 123.0.6312.105/.106/.107 (Windows and Mac) and 123.0.6312.105 (Linux), which will roll out worldwide over the coming days.One week ago, Google fixed two more Chrome zero-days exploited at Pwn2Own Vancouver 2024. The first, a high-severity type confusion weakness (CVE-2024-2887) in the WebAssembly (Wasm) open standard, was targeted by Manfred Paul's double-tap RCE exploit that targeted both Chrome and Edge.The second, a use-after-free (UAF) weakness in the WebCodecs API (CVE-2024-2886), was also exploited by KAIST Hacking Lab's Seunghyun Lee to gain remote code execution on both Chromium web browsers.Mozilla also patched two Firefox zero-days exploited by Manfred Paul at this year's Pwn2Own Vancouver competition on the same day the bugs were exploited.While both Google and Mozilla released security patches within a week, vendors usually take their time to fix Pwn2Own zero-days since Trend Micro's Zero Day Initiative publicly discloses bug details after 90 days.In total, Google patched four Chrome zero-days this year, with the fourth addressed in January as an actively exploited zero-day (CVE-2024-0519) that enabled attackers to crash unpatched browsers or access sensitive information due to an out-of-bounds memory access weakness in the V8 JavaScript engine.On Tuesday, the company also fixed two Android zero-days exploited by forensic firms to unlock Pixel phones without a PIN and gain access to the data stored within them.
2025-04-12Google Responds to Chrome Zero-Day Vulnerability CVE-2023-4863, Credits Apple and Citizen Lab for DiscoveryIn a swift action that underscores the perpetual arms race against cyber threats, Google recently launched a crucial update for its Chrome browser, patching the Chrome Zero-Day Vulnerability CVE-2023-4863. This marked the fourth zero-day vulnerability in Chrome that has been addressed this year.What is Chrome Zero-Day Vulnerability CVE-2023-4863?Chrome Zero-Day Vulnerability CVE-2023-4863 is a high-risk, heap buffer overflow issue affecting the WebP component of the browser. WebP is an advanced image format offering enhanced compression and quality, overshadowing its predecessors, JPEG and PNG. Almost all contemporary browsers, like Firefox, Safari, Edge, and Opera, support this image format.For those unfamiliar with the term, a “heap buffer overflow” occurs when an application tries to store more data in a heap-allocated memory buffer than it can actually hold. This can lead to application crashes and possibly open the door for hackers to execute arbitrary code on the victim's system.Google's advisory points out that they are aware that an exploit exists for this vulnerability “in the wild,” making it imperative for users to update their browsers immediately.For a more technical explanation of heap buffer overflow issues, check out this guide.Who Discovered the Vulnerability?The discovery of Chrome Zero-Day Vulnerability CVE-2023-4863 was credited to Apple's Security Engineering and Architecture (SEAR) and Citizen Lab at The University of Toronto’s Munk School. Citizen Lab frequently exposes commercial spyware activities, which leads to the speculation that this vulnerability might have been exploited by one such spyware vendor.
2025-03-31Google has released Chrome 91.0.4472.101 for Windows, Mac, and Linux to fix 14 security vulnerabilities, with one zero-day vulnerability exploited in the wild and tracked as CVE-2021-30551.Google Chrome 91.0.4472.101 has started rolling out worldwide and will become available to all users over the next few days.Google Chrome will automatically attempt to upgrade the browser the next time you launch the program, but you can perform a manual update by going to Settings > Help > 'About Google ChromeGoogle updated to version 91.0.4472.10Six Chrome zero-days exploited in the wild in 2021Few details regarding today's fixed zero-day vulnerability are currently available other than that it is a type confusion bug in V8, Google's open-source and C++ WebAssembly and JavaScript engine.The vulnerability was discovered by Sergei Glazunov of Google Project Zero and is being tracked as CVE-2021-30551.Google states that they are "aware that an exploit for CVE-2021-30551 exists in the wild."Shane Huntley, Director of Google's Threat Analysis Group, says that this zero-day was utilized by the same threat actors using the Windows CVE-2021-33742 zero-day fixed yesterday by Microsoft.Chrome in-the-wild vulnerability CVE-2021-30551 patched today was also from the same actor and targeting.Thanks to Chrome team for also patching within 7 days. Shane Huntley (@ShaneHuntley) June 9, 2021Today's update fixes Google Chrome's sixth zero-day exploited in attacks this year, with the other five listed below:CVE-2021-21148 - February 4th, 2021 CVE-2021-21166 - March 2nd, 2021 CVE-2021-21193 - March 12th, 2021 CVE-2021-21220 - April 13th, 2021 CVE-2021-21224 - April 20th, 2021 In addition to these vulnerabilities, news broke yesterday of a threat actor group known as Puzzlemaker that is chaining together Google Chrome zero-day bugs to escape the browser's sandbox and install malware in Windows."Once the attackers have used both the Chrome and Windows exploits to gain a foothold in the targeted system, the stager module downloads and executes a more complex malware dropper from a remote server," the researchers said.Microsoft fixed the Windows vulnerabilities yesterday as part of the June 2021 Patch Tuesday, but Kaspersky could not determine what Google Chrome vulnerabilities were used in the Puzzlemaker attacks.Kaspersky believes the attackers may have been using the
2025-04-13