Threat Watch

Google Fixes Fifth Chrome Zero-Day Bug Exploited This Year

Google has released a security update for the Chrome browser that addresses close to a dozen vulnerabilities, including a zero-day flaw that is being exploited in the wild. The security update is currently rolling out for Windows, Mac, and Linux. Users who have automatic updates turned on should receive it in the coming days/weeks. Google doesn’t typically provide many technical details about the zero-day vulnerabilities they fix until many Chrome users have applied the security update. The most recent vulnerability is tracked as CVE-2022-2856. It is described as a high-severity security issue due to “insufficient validation of untrusted input in Intents,” a feature that enables launching applications and web applications services directly from a web page. Bad input validation in software can serve as a pathway to overriding protections or exceeding the scope of the intended functionality, potentially leading to buffer overflow, directory traversal, SQL injection, cross-site scripting, null byte injection, and more. The vulnerability was discovered and reported by Ashley Shen and Christian Resell, both members of the Google Threat Analysis Group (TAG). “Google is aware that an exploit for CVE-2022-2856 exists in the wild,” explains the internet giant in the security advisory published yesterday.

ANALYST NOTES

To perform the update now, head to the browser’s settings, select “About Chrome” and let the browser’s internal checker scan for available updates. After the download is complete, restart the program to apply the security update. Since this flaw has already been exploited by threat actors, it is recommended to upgrade to the latest version of the browser as soon as possible.

https://www.bleepingcomputer.com/news/security/google-fixes-fifth-chrome-zero-day-bug-exploited-this-year/