Hackers Prompt Emergency Google 0-Day Attack Patch For Chrome Users | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker

Hackers Prompt Emergency Google 0-Day Attack Patch For Chrome Users | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


targeting Chrome users.

Getty Images



Google hackers Vlad Stolyarov and Clément Lecigne, part of the crack team of security researchers that form Google’s Threat Analysis Group, have uncovered the eighth zero-day vulnerability impacting Chrome browser users of the year.


What Have The Google Hackers Discovered?


In response to the discovery of CVE-2023-7024, Google has issued an emergency attack patch for all Chrome users as it is known that an exploit already exists on the wild. Rated as a high-severity vulnerability, CVE-2023-7024 impacts the open-source WebRTC component of the Chrome web browser and is of the heap buffer overflow variety. This real-time communication component enables audio and video communication within web pages and is deployed by most modern browsers. Google doesn’t reveal details of such vulnerabilities until such a time as a majority of users have been able to apply the patch and update their browsers. However, any web browser based on the Chromium project will likely be vulnerable to the same exploit.


MORE FROM FORBESGoogle Confirms 6 Months Of Missing Drive Files-Here’s The FixBy Davey Winder


Emergency Google Chrome Patch Rolled Out Within 24 Hours


The seriousness of this vulnerability can be gauged not only from the severity rating it has been allocated but also from the speed of releasing this emergency patch for Chrome users. Google says that it was only reported by the TAG hackers on 19 December, with the update confirmation being posted the next day.


Google says it will roll out the update to patch vulnerable Chrome installations in the coming days and weeks. This will take your Chrome version to 20.0.6099.129 or 20.0.6099.130 if you are a W ..

Support the originator by clicking the read the rest link below.