Critical Zero-Day Flaw in Google Chrome Requires Immediate Update
Cybersecurity3 min read

Critical Zero-Day Flaw in Google Chrome Requires Immediate Update

29 Nov 202329 Nov 2023 ncert.gov.ph

A newly identified zero-day vulnerability, CVE-2023-6345, in Google Chrome puts users at risk. Google has released updates to address this issue and strengthen browser security.

Key Takeaways

  • 1.> "Google is aware of reports that an exploit for CVE-2023-6345 exists in the wild," CVE-2023-6345 is one of several vulnerabilities addressed in this update.
  • 2.Google has announced an urgent update for its Chrome browser, addressing a range of security issues which include a zero-day vulnerability designated as CVE-2023-6345.
  • 3.This update, identified as Version 119.0.6045.199 for Mac and Linux, along with Version 119.0.6045.199/200 for Windows, aims to protect users from potential threats stemming from this critical flaw.

Google has announced an urgent update for its Chrome browser, addressing a range of security issues which include a zero-day vulnerability designated as CVE-2023-6345. This update, identified as Version 119.0.6045.199 for Mac and Linux, along with Version 119.0.6045.199/200 for Windows, aims to protect users from potential threats stemming from this critical flaw.

The allure of the patched vulnerability is underscored by Google's own acknowledgment: "Google is aware of reports that an exploit for CVE-2023-6345 exists in the wild," revealing the seriousness of the situation. With the presence of active exploits, users are urged to act quickly to secure their systems and sensitive information.

"Google is aware of reports that an exploit for CVE-2023-6345 exists in the wild,"

CVE-2023-6345 is one of several vulnerabilities addressed in this update. The nature of the flaw involves an integer overflow in Skia, a graphics library used by Chrome. This specific vulnerability was reported by Benoît Sevens and Clément Lecigne from Google’s Threat Analysis Group on November 24, 2023.

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

In addition to CVE-2023-6345, Google has resolved several other vulnerabilities during this update cycle. Notable among them is CVE-2023-6346, which involves a use-after-free error in WebAudio and was reported by Huang Xilin of Ant Group Light-Year Security Lab only weeks earlier, on November 9. Other vulnerabilities include: - CVE-2023-6347, identified as a use-after-free issue in Mojo, reported by Leecraso and Guang Gong of the 360 Vulnerability Research Institute on October 21. - CVE-2023-6348, which pertains to type confusion in the Spellcheck feature, reported by Mark Brand of Google Project Zero on October 10. - CVE-2023-6350 and CVE-2023-6351, both dealing with out-of-bounds memory access and use-after-free errors in the libavif library, with disclosures from researchers at Fudan University on November 13.

Looking Ahead

Given the serious ramifications that CVE-2023-6345 could pose, the Computer Emergency Response Team of the Philippines (CERT-PH) has issued recommendations for users. They urge, "Review and apply the necessary updates to mitigate future threats," emphasizing the simple steps to check for the latest version. Users can easily ensure their browser is up to date by navigating to Chrome Settings, selecting Help, and then clicking on About Google Chrome.

"Review and apply the necessary updates to mitigate future threats,"

The convergence of these vulnerabilities highlights the critical nature of cybersecurity in modern web usage. As exploits for such vulnerabilities can lead to data breaches and personal information theft, maintaining updated software is essential. users must prioritize these updates to enhance their online safety and fortify browser resilience against potential exploits.

In conclusion, with threats intensifying in the cybersecurity landscape, swift action on the part of users is imperative. Google's proactive release of updates serves not only to address immediate dangers but also reinforces the importance of vigilance against emerging vulnerabilities. As always, staying informed about such threats and promptly applying security updates remains a cornerstone of effective digital safety.

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

More Stories