Users of Google Chrome can finally exhale with peace as the tech giant has quickly released an update to solve a serious security vulnerability. A zero-day vulnerability that attackers had actively used is the focus of the most recent patch. This flaw put users’ systems at serious risk because it was included in an essential component of the Chrome browser that renders web content. Attackers could take advantage of this vulnerability and access a user’s computer without authorization by sending them to a specially created website to take advantage of the weakness.
Also read: How to Make Chrome Load Websites on Autopilot
Google has released a comprehensive patch that resolves the root cause of the problem and strengthens the browser’s defences against future attacks of this kind to lessen the threat. To maintain their safety and security when visiting the web, Chrome users on desktop platforms must immediately update their browsers to the most recent version. Google’s prompt action demonstrates the company’s steadfast dedication to protecting its users’ online experiences.
Google Chrome has remedies for zero-day security weakness
The search engine giant announced that Google Chrome has been updated with remedies for a zero-day security weakness actively exploited in the wild. When a user accesses a maliciously created website, a component in Chrome that produces web content on the user’s screen is vulnerable, which gives attackers access to the user’s machine. To stay safe, Chrome users on desktop computers using any browser version must ensure it is updated to the most recent version.
As per the information provided by the business in a blog post, a security weakness with a severity rating of ‘High’ has been fixed in the most recent stable versions of Google Chrome for Linux, macOS, and Windows. Google reports that it has corrected a publicly known vulnerability (CVE-2024-4671) that affects the Chrome Visuals component, which an unidentified outside researcher discovered.
Attackers could access out-of-bounds memory
By exploiting a use-after-free vulnerability, an attacker could gain access to out-of-bounds memory when a user accesses a webpage that has been maliciously designed. Thanks to this, they would be able to access and control the system and retrieve data remotely.
In its blog post, it’s noteworthy that Google “is aware that an exploit for CVE-2024-4671 exists in the wild.” Hence, users must ensure that Chrome is installed on the most recent stable version, version 124.0.6367.201/.202 for Windows and macOS and version 124.0.6367.201 for Linux systems. If the “Update Google Chrome” option isn’t displayed, the most recent version of Chrome has already been installed.
On Windows, users can access this menu by clicking the three dots in the upper right corner of the screen, selecting Help > About Google Chrome, and finally clicking on Update Google Chrome. To receive the most recent updates, Linux users must use their package manager to obtain automatic updates. At the same time, macOS users can choose the option in the same menu to “Automatically update Chrome for all users.”