• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Google Patches Chrome Zero Day Under Attack

You are here: Home / General Cyber Security News / Google Patches Chrome Zero Day Under Attack
July 6, 2022

Google has launched an update to its well-liked Chrome browser to resolve four vulnerabilities, together with just one zero-day recent becoming exploited by attackers.

The new Chrome model 103..5060.114 will be rolled out to Windows people around the coming times and months, in accordance to a Google advisory.

It consists of the large severity CVE-2022-2294, a heap buffer overflow bug in WebRTC. It was noted by Avast researcher Jan Vojtesek on July 1.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“We would also like to thank all security researchers that labored with us for the duration of the improvement cycle to reduce security bugs from at any time reaching the stable channel,” Google claimed. “Google is knowledgeable that an exploit for CVE-2022-2294 exists in the wild.”

There was no supplemental information and facts at the time of composing on how the zero-working day is getting exploited, by whom and for what purpose.

Nonetheless, Google produced details of two other high-severity vulnerabilities observed by external scientists, which it fixed in the update.

CVE-2022-2295 is a variety confusion bug in the V8 JavaScript engine, and CVE-2022-2296 is a use-immediately after-free (UAF) flaw in the Chrome OS Shell.

Patrick Tiquet, VP of security & architecture at Keeper Security, described that CVE-2022-2294 could lead to arbitrary remote code execution simply just by checking out a destructive web page.

“This could allow an attacker to conduct a selection of actions on a goal system, these as set up malware or steal details. Web browsers are important programs that practically all cloud-based products and services have in prevalent and are hence higher-precedence targets – compromise of a web browser could be leveraged to compromise any cloud-primarily based service accessed by that browser,” he extra.

“Ensuring that web browsers are patched is a consumer or consumer corporation duty. Web browsers, if not maintained and patched, can be a weak hyperlink in the security of any cloud-dependent support. Consumer web browsers must be particularly regarding to cloud solutions in this circumstance because they are largely outside the house of the security controls of the cloud services company.”

This is the fourth Chrome zero-day bug that Google has been pressured to resolve so significantly this yr following updates in February, March and April.


Some sections of this report are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Bitter APT Hackers Continue to Target Bangladesh Military Entities
Next Post: Messaging apps could be forced to check all messages for child abuse content in Online Safety Bill amendment messaging apps could be forced to check all messages for»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.