Google Chrome, Microsoft IE Zero-Days in Crosshairs

Google late Thursday night shipped an emergency patch to close a Chrome browser vulnerability that was being used in mysterious zero-day attacks.


The Google Chrome patch, which is being pushed via the browser’s automatic self-patching, covers a critical vulnerability in V8, Google’s  JavaScript and WebAssembly engine.


The “high-risk” vulnerability affects users on Windows, MacOS and Linux platforms.


The Google advisory is scant on details:



High CVE-2021-21148: Heap buffer overflow in V8. Reported by Mattias Buelens on 2021-01-24

Google is aware of reports that an exploit for CVE-2021-21148 exists in the wild.We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.



Technical details on the flaw are being held private. The patch release comes amidst reports that a Google Chrome zero-day exploit was being used in the North Korean government-backed attacks against numerous researchers and personalities scattered across the offensive and defensive security space.


Beyond a blog post with the initial warning from its TAG (Threat Analysis Group), Google has been quiet on the possible use of a Chrome zero-day was used in the North Korean social-engineering campaign and whether this latest patch provides cover for that vulnerability.


A source tells SecurityWeek the two issues are “unrelated” but stressed that a comprehensive investigation has not yet been completed.


Adding fuel to the fire, South Korean security vendor ENKI has published a claim that a Microsoft Internet Explorer (IE) browser zero-d ..

Support the originator by clicking the read the rest link below.