Chrome issues patch for high vulnerabilities
Take action: Update your Chrome to version 113.0.5672.63/.64 for Windows or version 113.0.5672.63 for Mac and Linux. And be very careful about links in unknown emails or uknown websites since the attack will be executed by leading the victim onto a malicious web site.
Learn More
Multiple critical vulnerabilities have been discovered in Google Chrome. These vulnerabilities have the potential to allow attackers to execute arbitrary code on targeted systems. The severity of these vulnerabilities is rated as high, and it is strongly recommended that users update their Chrome installations to version 113.0.5672.63/.64 for Windows or version 113.0.5672.63 for Mac and Linux to mitigate the associated risks.
The vulnerabilities in Chrome stem from various issues within the browser. One of the issues involves insufficient validation of untrusted input in Extensions, which can be exploited by malicious actors to manipulate Chrome's functionality and execute arbitrary code. Additionally, a use-after-free vulnerability in OS Inputs allows attackers to exploit memory errors, which can potentially lead to the execution of arbitrary code.
Furthermore, certain features in Google Chrome, such as Prompts, Full Screen Mode, Picture-in-Picture, and Cross-Origin Resource Sharing (CORS), have implementation flaws that can be exploited. Exploiting these flaws could grant unauthorized access to sensitive information or allow for the execution of arbitrary code.
To exploit these vulnerabilities, an attacker would need to lure a victim into visiting a specially crafted web page. This can be achieved through various social engineering techniques, including phishing emails, malicious links, or compromised websites. Once the victim accesses the malicious page using an outdated version of Chrome, the attacker can execute arbitrary code on the victim's system.
In response to these critical vulnerabilities, Google has released updated versions of Chrome. Users are advised to apply the latest patches immediately. Windows users should update to version 113.0.5672.63/.64, while Mac and Linux users should update to version 113.0.5672.63.