The Google Chrome team’s Srinivas Sista confirmed that the most recent Chrome version had patched 11 security vulnerabilities, ranging in severity from medium to critical, in a bulletin released on August 16. A zero-day vulnerability among them is CVE-2022-2856.
Zero-Day attacks target zero-day vulnerabilities that are so recent that security companies have never noticed them and have zero time to patch them. These are security flaws in computer programs unknown to the vendor or developer. As a result, the vulnerability is exploitable by attackers until a patch or other remedies are made available.
According to the US Cybersecurity and Infrastructure Security Agency, customers that don’t patch CVE-2022-22536 could be vulnerable to ransomware attacks, data theft, financial fraud, and other costly business disruptions.
Chrome users are at risk, regardless of whether they use Windows, Mac, or Linux. Ensure that you installed the most recent Chrome update in your browser. Mac, Linux, and Windows users can access Chrome via updated versions 104.0.5112.101 or 104.0.5112.102, respectively.
Until most users have installed and enabled the update, not much information is being made public regarding the zero-day vulnerability.
Google did, however, acknowledge that on July 19, hackers Ashley Shen and Christian Resell from the Google Threat Analysis Group disclosed CVE-2022-2856, “insufficient validation of untrusted input in Intents.”
The Intents technology is in the background when processing user input or responding to a system event. Anyone who can create malicious information might take advantage of this vulnerability, which could cause Chrome to validate it erroneously and allow arbitrary code execution or system takeover.
A successful attack could compromise the system’s confidentiality, integrity, and availability, warns the National Institute of Standards and Technology. “An unauthenticated attacker can prepend a victim’s request with arbitrary data. This way, the attacker can execute functions posing as the victim or poison intermediary Web caches.”
Maintain a reliable firewall and current antivirus software, limit user access, back up your data, and utilize a network intrusion protection system to mitigate damages.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...