Article Details

Scrape Timestamp (UTC): 2024-05-16 03:01:42.784

Source: https://thehackernews.com/2024/05/google-patches-yet-another-actively.html

Original Article Text

Click to Toggle View

Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability. Google has rolled out fixes to address a set of nine security issues in its Chrome browser, including a new zero-day that has been exploited in the wild. Assigned the CVE identifier CVE-2024-4947, the vulnerability relates to a type confusion bug in the V8 JavaScript and WebAssembly engine. It was reported by Kaspersky researchers Vasily Berdnikov and Boris Larin on May 13, 2024. Type confusion vulnerabilities arise when a program attempts to access a resource with an incompatible type. It can have serious impacts as it allows threat actors to perform out-of-bounds memory access, cause a crash, and execute arbitrary code. The development marks the third zero-day that Google has patched within a week after CVE-2024-4671 and CVE-2024-4761. As is typically the case, no additional details about the attacks are available and have been withheld to prevent further exploitation. "Google is aware that an exploit for CVE-2024-4947 exists in the wild," the company said. With CVE-2024-4947, a total of seven zero-days have been resolved by Google in Chrome since the start of the year - Users are recommended to upgrade to Chrome version 125.0.6422.60/.61 for Windows and macOS, and version 125.0.6422.60 for Linux to mitigate potential threats. Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available.

Daily Brief Summary

MALWARE // Google Addresses New Chrome Zero-Day Exploit with Urgent Patch

Google has issued updates to fix a newly discovered zero-day vulnerability, CVE-2024-4947, in its Chrome browser, actively exploited in the wild.

The vulnerability exists due to a type confusion issue in Chrome's V8 JavaScript engine, allowing attackers to execute arbitrary code.

Kaspersky researchers flagged the security flaw, marking it the third zero-day patched by Google in just a week.

This type of vulnerability enables unauthorized out-of-bounds memory access, potentially leading to system crashes and uncontrolled code execution.

Google has now addressed seven zero-day vulnerabilities in Chrome since the beginning of the year.

Users are strongly urged to update their Chrome browsers to the latest version (125.0.6422.60/.61 for Windows and macOS, 125.0.6422.60 for Linux) to protect against potential exploits.

Updates are also recommended for users of other Chromium-based browsers like Microsoft Edge, Brave, Opera, and Vivaldi as patches become available.