Google Patches More Under-Attack Chome Zero-days

Google’s problems with in-the-wild Chrome browser zero-days appear to be multiplying by the month.


The latest confirmation of this appears today with a new Chrome point-update to patch a pair of security vulnerabilities affecting Windows, MacOS and Linux users. Google said it was aware of reports that both of these vulnerabilities - CVE-2021-21206 and CVE-2021-21220 -- are being exploited in the wild.   


As has become normal, Google did not provide any other details on the attacks or provide any IOCs to help organizations find signs of infection.


[ SEE: Sophisticated APT Group Burned 11 Zero-Days ]


The company confirmed that one of the bugs -- described as “insufficient validation of untrusted input in V8 for x86_64” -- was part of an exploit chain demonstrated at last week’s Pwn2Own marketing contest.


The second under-attack bug is currently documented simply as a use-after-free memory corruption vulnerability in Blink, the rendering engine used in Chrome.  Google said the bug was reported anonymously.


So far in 2021, Google has rushed out fixes for at least three separate in-the-wild zero-day attacks.


Related: Google Chrome Zero-Day Under Attack, Again


Related: Google Chrome, Microsoft IE Zero-Days in Crosshairs







Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. Ryan is a journalist and cybersecurity strategist with more than 20 years experience covering IT security and technology trends. He is a regular speaker at cybersecurit ..

Support the originator by clicking the read the rest link below.