Google has urged Chrome users to update the web browser to the latest version in order to avoid being targeted by cybercriminals.
Late last week, the company released Chrome 99.0.4844.84 for Windows, Mac, and Linux, which fixes a high severity zero-day vulnerability that allows for remote code execution.
What’s more, the issue has already been abused in real-life scenarios. “Google is aware that an exploit for CVE-2022-1096 exists in the wild,” the company announced.
Google Chrome zero-day
It allows an attacker to crash the browser, and could therefore be abused for a denial of service attack, as well as to execute arbitrary code, which could lead to malware and ransomware infections.
Because the flaw is being abused in the wild, Google is deliberately withholding additional information until users are able to patch up their systems.
“Access to bug details and links may be kept restricted until a majority of users are updated with a fix,” Google said. “We will also retain restrictions if the bug exists in a third-party library that other projects similarly depend on, but haven’t yet fixed.”
The fix is already out, but it could take weeks before it reaches each and every Chrome user. Anyone looking to check whether their client has updated automatically can do so via Chrome Menu > Help > About Google Chrome, which will reveal the version number.
This is the second zero-day found and patched in Chrome since the start of the year, following the discovery of CVE-2022-0609. Google describes the vulnerability as “use after free in animation”, but has not gone into much detail about what this entails or how extreme the risk is.
The company says the flaws are being abused in the wild, but declined to share any details as to how they are being abused, or by whom. It’s difficult to say if malware was developed to abuse the flaw, and whether or not it will be picked up by antivirus solutions.