Google has released urgent updates to address a high-severity vulnerability in its Chrome web browser that has been actively exploited. The vulnerability, known as CVE-2023-7024, is a heap-based buffer overflow flaw in the WebRTC framework that could cause software crashes or allow for arbitrary code execution. Google has updated the stable channel to version 120.0.6099.129/130 for Windows and 120.0.6099.129 for Mac and Linux in order to mitigate the issue. The update will be implemented over the coming days and weeks. The vulnerability was discovered and reported by Clément Lecigne and Vlad Stolyarov from Google’s Threat Analysis Group. In response to the exploit, Google has withheld information about the attacks and has restricted access to bug details until a majority of users have updated with the fix. This is the eighth actively exploited zero-day vulnerability that Chrome has patched this year. Google strongly advises users to update their Chrome web browsers immediately to avoid exploitation. To update, users should go to the Settings option, select About Chrome, wait for the update to automatically download and install, and then restart Chrome.
Related Posts
Security researchers have uncovered four zero-day vulnerabilities within OpenVPN, the world’s leading VPN solution. These vulnerabilities pose significant threats to…
Samsung has devices affected by a critical security vulnerability (CVE-2024-44068) that affects multiple Exynos mobile processors actively exploited in the…
New identical Windows Theme Zero-Day Vulnerability Let Attackers Steal Credentials vulnerability that might allow attackers to obtain NTLM credentials of…