• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
urgent: new chrome zero day vulnerability exploited in the wild

Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild – Update ASAP

You are here: Home / General Cyber Security News / Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild – Update ASAP
December 21, 2023

Google has rolled out security updates for the Chrome web browser to deal with a higher-severity zero-day flaw that it explained has been exploited in the wild.

The vulnerability, assigned the CVE identifier CVE-2023-7024, has been explained as a heap-centered buffer overflow bug in the WebRTC framework that could be exploited to outcome in software crashes or arbitrary code execution.

Clément Lecigne and Vlad Stolyarov of Google’s Danger Analysis Group (TAG) have been credited with discovering and reporting the flaw.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


No other particulars about the security defect have been released to reduce even more abuse, with Google acknowledging that “an exploit for CVE-2023-7024 exists in the wild.”

The improvement marks the resolution of the eighth actively exploited zero-day in Chrome because the start out of the 12 months –

  • CVE-2023-2033 (CVSS rating: 8.8) – Sort confusion in V8
  • CVE-2023-2136 (CVSS rating: 9.6) – Integer overflow in Skia
  • CVE-2023-3079 (CVSS rating: 8.8) – Form confusion in V8
  • CVE-2023-4762 (CVSS score: 8.8) – Style confusion in V8
  • CVE-2023-4863 (CVSS score: 8.8) – Heap buffer overflow in WebP
  • CVE-2023-5217 (CVSS rating: 8.8) – Heap buffer overflow in vp8 encoding in libvpx
  • CVE-2023-6345 (CVSS score: 9.6) – Integer overflow in Skia

A total of 26,447 vulnerabilities have been disclosed so much in 2023, surpassing the past calendar year by above 1,500 CVEs, in accordance to details compiled by Qualys, with 115 flaws exploited by threat actors and ransomware groups.

Cybersecurity

Distant code execution, security feature bypass, buffer manipulation, privilege escalation, and input validation and parsing flaws emerged as the major vulnerability types.

Customers are recommended to upgrade to Chrome model 120..6099.129/130 for Windows and 120..6099.129 for macOS and Linux to mitigate potential threats.

Customers of Chromium-based mostly browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to utilize the fixes as and when they come to be offered.

Identified this article exciting? Comply with us on Twitter  and LinkedIn to examine more distinctive material we put up.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «remote encryption attacks surge: how one vulnerable device can spell Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell Disaster
Next Post: Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware hackers exploiting old ms excel vulnerability to spread agent tesla»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.