A new update for Google Chrome has been released in response to a single high-severity zero-day vulnerability known as CVE-2022-3075.
Google said it was “aware of reports” that a vulnerability in its web browser had been exploited in the wild.
The latest update will now be fully rolled out to all Chrome users on the Stable Desktop channel for all Windows, Linux, and Mac users.
Am I protected?
You can check if you are fully updated by opening Chrome and selecting “Menu> Help> About Google Chrome”.
Google said it is not yet ready to provide more information about the vulnerability or how it works, possibly with the goal of stopping cybercriminals from trying to exploit it before the user base is fully updated.
However, the search giant revealed that the vulnerability was reported by an anonymous security researcher.
There have been very serious reports of cases where hackers have taken advantage of Google Chrome zero-day vulnerabilities.
According report (opens in a new tab) by Google’s Threat Analysis Group (TAG), North Korean hackers exploited a zero-day remote code execution vulnerability in Chrome to launch state-sponsored cyber attacks.
According to the report, it took over a month for the patch to become available.
Since early 2022, Google has patched six zero-day vulnerabilities in Chrome, including CVE-2022-0609, CVE-2022-1096, CVE-2022-1364, CVE-2022-2294, and CVE-2022-2856.
Users of Google open source Chromium-based browsers such as Microsoft Edge, Opera, or Samsung internet could also be affected by this type of vulnerability, and it would be in their best interest to ensure that their browsers are updated.
Unfortunately for consumers worldwide, Google Chrome remains a common endpoint that criminals use to compromise users.
According to a recent study by McAfee, over 1.4 million users had malicious Google Chrome extensions in their browsers that modify victim’s cookies each time they visit online stores in order to deduct affiliate fees from their purchases.
- Worried that your tools aren’t getting the right updates when they need them? Check out our guide to the best patch management tools