Urgent: New Chrome 0-Day Vulnerability Under Active Exploitation – Update Your Browser Immediately!

On March 3, 2021, just a month after addressing an actively exploited zero-day flaw, Google has released updates for another critical vulnerability in Chrome, which is reportedly being targeted by attackers. The latest version, Chrome 89.0.4389.72, available for Windows, Mac, and Linux, includes a total of 47 security enhancements. The most severe issue addresses an “object lifecycle problem in audio,” tracked as CVE-2021-21166. This vulnerability was among two reported by Alison Huffman of Microsoft Browser Vulnerability Research on February 11. A separate audio-related object lifecycle flaw was reported to Google on February 4, coinciding with the launch of Chrome 88. Though details are limited, it’s unclear whether the two issues are interconnected. Google has confirmed the existence of exploits in the wild but hasn’t provided further specifics. Users are urged to update their browsers without delay.

New Chrome Zero-Day Vulnerability Under Active Exploitation—Update Your Browser Immediately

March 3, 2021

In a critical update, Google has announced the release of patches for a newly identified zero-day vulnerability within its Chrome web browser, which is reportedly being actively targeted by attackers. This follows just a month after the company addressed another vulnerability in the same software. The latest update, Chrome version 89.0.4389.72, is now available for Windows, Mac, and Linux systems. It includes a comprehensive set of 47 security fixes, with a significant focus on an “object lifecycle issue” related to audio processing. This vulnerability has been assigned the identifier CVE-2021-21166.

The security flaw was among two reported by Alison Huffman from Microsoft Browser Vulnerability Research on February 11. The second related issue, which also deals with an object lifecycle flaw within the audio component, was disclosed to Google on February 4, coinciding with the rollout of the stable version of Chrome 88. While the exact relationship between these two vulnerabilities remains unclear due to limited documentation from Google, it is now confirmed that threat actors are exploiting CVE-2021-21166 in real-world scenarios.

The notification raises immediate concerns for users, particularly those in business environments where vulnerability management is crucial. As Chrome continues to dominate the browser market, the implications of such vulnerabilities can be substantial. Hackers may leverage this flaw to gain unauthorized access and escalate privileges, posing significant risks to sensitive data and organizational integrity.

When assessing the potential tactics and techniques that attackers might employ, the MITRE ATT&CK Matrix provides a useful framework. The initial access phase may involve phishing or exploitation of the flaw itself, enabling adversaries to execute malicious code. Additionally, persistence techniques could be utilized to maintain a foothold within compromised systems, allowing for further exploitation without detection.

Google has acknowledged that exploits for this vulnerability are publicly available, further emphasizing the urgent need for users and organizations to update their browsers immediately. To mitigate risks associated with these types of attacks, it is advisable for businesses to implement a robust patch management strategy and maintain ongoing user education about cybersecurity best practices.

In summary, the latest security advisory highlights the importance of maintaining updated software as a fundamental component of cybersecurity hygiene. Business owners and IT professionals should prioritize the swift application of these patches to protect their environments from potential exploitations tied to the newly identified Chrome zero-day vulnerability. As the threat landscape continues to evolve, vigilance and proactive measures remain essential in safeguarding against cyber threats.

Source link