{"id":1256,"date":"2023-04-15T20:08:51","date_gmt":"2023-04-15T19:08:51","guid":{"rendered":"https:\/\/zerothcode.com\/blog\/?p=1256"},"modified":"2023-04-15T20:08:51","modified_gmt":"2023-04-15T19:08:51","slug":"google-releases-chrome-update-exploited-google-chrome-hack","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/google-releases-chrome-update-exploited-google-chrome-hack\/","title":{"rendered":"Google Releases Urgent Chrome Update to Fix Actively Exploited Zero-Day Vulnerability"},"content":{"rendered":"<p>Google on Friday released out-of-band updates to resolve an actively exploited zero-day flaw in its Chrome web browser, making it the first such bug to be addressed since the start of the year. google chrome hack<\/p>\n<h3>Tracked as\u00a0<strong>CVE-2023-2033<\/strong>, the high-severity vulnerability has been described as a\u00a0<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/843.html\" target=\"_blank\" rel=\"noopener\">type confusion issue<\/a>\u00a0in the V8 JavaScript engine. Clement Lecigne of Google&#8217;s Threat Analysis Group (TAG) has been credited with reporting the issue on April 11, 2023.<\/h3>\n<p>&#8220;Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page,&#8221;\u00a0<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-2033\" target=\"_blank\" rel=\"noopener\">according<\/a>\u00a0to the NIST&#8217;s National Vulnerability Database (NVD). google chrome hack<\/p>\n<p>The tech giant\u00a0<a href=\"https:\/\/chromereleases.googleblog.com\/2023\/04\/stable-channel-update-for-desktop_14.html\" target=\"_blank\" rel=\"noopener\">acknowledged<\/a>\u00a0that &#8220;an exploit for CVE-2023-2033 exists in the wild,&#8221; but stopped short of sharing additional technical specifics or indicators of compromise (IoCs) to prevent further exploitation by threat actors.<\/p>\n<p>CVE-2023-2033 also appears to share similarities with\u00a0CVE-2022-1096,\u00a0CVE-2022-1364,\u00a0CVE-2022-3723, and\u00a0CVE-2022-4262\u00a0\u2013 four other actively abused type confusion flaws in V8 that were remediated by Google in 2022.<\/p>\n<p>Google closed out a total of nine zero days in Chrome last year. The development comes days after Citizen Lab and Microsoft\u00a0disclosed\u00a0the exploitation of a now-patched flaw in Apple iOS by customers of a shadowy spyware vendor named QuaDream to target journalists, political opposition figures, and an NGO worker in 2021.<\/p>\n<p>Users are recommended to upgrade to version 112.0.5615.121 for Windows, macOS, and Linux to mitigate potential threats. Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available. <a href=\"https:\/\/zerothcode.com\/blog\/watch-admins-two\/\">google chrome hack<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"0r98wMauhz\"><p><a href=\"https:\/\/zerothcode.com\/blog\/google-bug-docs\/\">A Google Docs Bug Could Have Allowed Hackers See Your Private Documents<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;A Google Docs Bug Could Have Allowed Hackers See Your Private Documents&#8221; &#8212; ZEROTHCODE\" src=\"https:\/\/zerothcode.com\/blog\/google-bug-docs\/embed\/#?secret=G5ss4AzXOp#?secret=0r98wMauhz\" data-secret=\"0r98wMauhz\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google on Friday released out-of-band updates to resolve an actively exploited zero-day flaw in its Chrome web browser, making it<\/p>\n","protected":false},"author":1,"featured_media":1257,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[320,352,265,1002,310,134,180],"class_list":["post-1256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=1256"}],"version-history":[{"count":1,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1256\/revisions"}],"predecessor-version":[{"id":1258,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1256\/revisions\/1258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/1257"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=1256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=1256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=1256"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=1256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}