Google, a leading search engine, fixed a newly discovered and actively exploited zero-day vulnerability in its Chrome web browser on Friday.
The high-severity problem affects a type confusion bug in the V8 JavaScript engine and is tagged as CVE-2022-4262. On November 29, 2022, Clement Lecigne of Google’s Threat Analysis Group (TAG) is credited for reporting the problem.
Threat actors might take advantage of type confusion flaws to execute arbitrary code, crash, or get access to out-of-bounds memory.
According to the NIST’s National Vulnerability Database, the flaw permits a “remote attacker to potentially exploit heap corruption via a crafted HTML page.”
Google confirmed that the vulnerability was being actively exploited but chose not to provide more details in order to discourage further abuse.
The fourth actively exploited type confusion flaw that Google has fixed since the year’s beginning is CVE-2022-4262.
Additionally, it’s the ninth zero-day vulnerability in Chrome that users have seen in the wild in 2022.
To reduce dangerous threats, users are advised to update to versions 108.0.5359.94 for macOS and Linux and 108.0.5359.94/.95 for Windows as soon as possible.
As soon as the solutions become available, users of Chromium-based browsers like Microsoft Edge, Brave, Opera, and Vivaldi are encouraged to install them.
Suggest an edit to this article
Remember, CyberSecurity Starts With You!
This post was last modified on 4 December 2022 1:30 AM
British high street chain WH Smith has recently revealed that it was hit by a…
As banks worldwide roll out Voice ID as a means of user authentication over the…
In the era of digital transformation, cybersecurity has become a major concern for businesses. When…
In today's digital age, cybersecurity threats have become a significant concern for businesses of all…
The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…
One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…
Leave a Comment