Update your browser! Critical vulnerabilities discovered in Google Chrome
The Indian government has issued a high-risk warning to Google Chrome users, due to critical vulnerabilities detected in the browser. These flaws could potentially expose their systems to cyberattacks. The alert was released by the Indian Computer Emergency Response Team (CERT-In), which identified multiple security vulnerabilities in Chrome. If exploited, these weaknesses could enable remote attackers to execute malicious code or cause system crashes.
Chrome vulnerabilities categorized as high-severity
CERT-In's recent Vulnerability Note - CIVN-2024-0311, issued on September 26, details a series of vulnerabilities in Chrome. These issues have been classified as high-severity due to their potential impact on users' systems. The vulnerabilities are attributed to defects in Chrome's JavaScript engine (V8) and improper implementations, resulting in significant security risks.
Hackers can exploit these vulnerabilities for malicious activities
Hackers could potentially exploit these vulnerabilities to run arbitrary code on the target system. This means a cyberattacker could gain control over the affected system, steal confidential information, or install harmful software. In extreme cases, an attacker could cause the Chrome browser to crash, paving the way for further exploitation. The identified flaws include Type Confusion in V8 and Use-after-free vulnerabilities as well as inappropriate implementation issues.
CERT-In identifies affected Chrome versions and platforms
CERT-In has confirmed that these vulnerabilities affect all platforms, including Windows, macOS, and Linux. The vulnerabilities impact Chrome versions prior to 129.0.6668.70/.71 for Windows and Mac, and versions before 129.0.6668.70 for Linux. Google has already rolled out an update that addresses these vulnerabilities in its Chrome browser. To reduce the risks associated with these vulnerabilities, both CERT-In and Google are urging users to update their Chrome browser to the latest version.