Lucene search

K
thnThe Hacker NewsTHN:CDFC216AC6B26D35C38BDB32822B4E96
HistoryApr 15, 2023 - 3:58 a.m.

Google Releases Urgent Chrome Update to Fix Actively Exploited Zero-Day Vulnerability

2023-04-1503:58:00
The Hacker News
thehackernews.com
102

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Chrome Zero-Day Vulnerability

Google on Friday released out-of-band updates to resolve an actively exploited zero-day flaw in its Chrome web browser, making it the first such bug to be addressed since the start of the year.

Tracked as CVE-2023-2033, the high-severity vulnerability has been described as a type confusion issue in the V8 JavaScript engine. Clement Lecigne of Googleโ€™s Threat Analysis Group (TAG) has been credited with reporting the issue on April 11, 2023.

โ€œType confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page,โ€ according to the NISTโ€™s National Vulnerability Database (NVD).

The tech giant acknowledged that โ€œan exploit for CVE-2023-2033 exists in the wild,โ€ but stopped short of sharing additional technical specifics or indicators of compromise (IoCs) to prevent further exploitation by threat actors.

CVE-2023-2033 also appears to share similarities with CVE-2022-1096, CVE-2022-1364, CVE-2022-3723, and CVE-2022-4262 โ€“ four other actively abused type confusion flaws in V8 that were remediated by Google in 2022.

Google closed out a total of nine zero-days in Chrome last year. The development comes days after Citizen Lab and Microsoft disclosed the exploitation of a now-patched flaw in Apple iOS by customers of a shadowy spyware vendor named QuaDream to target journalists, political opposition figures, and an NGO worker in 2021.

It also comes within a week of Apple releasing updates to patch two actively exploited zero-day vulnerabilities (CVE-2023-28205 and CVE-2023-28206) in iOS, iPadOS, macOS, and Safari web browser that could lead to arbitrary code execution.

Users are recommended to upgrade to version 112.0.5615.121 for Windows, macOS, and Linux to mitigate potential threats. Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available.

Found this article interesting? Follow us on Twitter ๏‚™ and LinkedIn to read more exclusive content we post.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H