HomeCyber BalkansTwo Newly Discovered Chrome Zero-Days Exploited in the Wild for Malicious Code...

Two Newly Discovered Chrome Zero-Days Exploited in the Wild for Malicious Code Execution

Published on

spot_img

Urgent Security Update Released for Google Chrome to Address Two Critical Vulnerabilities

In an urgent move to protect users, Google has made a significant security update available for its popular Chrome desktop browser. This update focuses on addressing two critical zero-day vulnerabilities identified as CVE-2026-3909 and CVE-2026-3910. Both vulnerabilities have been categorized as high-severity and are known to be actively exploited by cybercriminals in the wild, prompting Google to recommend users update their browsers immediately.

Understanding the Vulnerabilities

The vulnerabilities were first discovered by Google’s internal security teams on March 10, 2026, and detailed in the Stable Channel update released on March 12, 2026. Important to note, CVE-2026-3909 represents an “out-of-bounds write” flaw located in Skia, the open-source 2D graphics library integral to Chrome’s functionality. Out-of-bounds write vulnerabilities are notably dangerous as they allow attackers to write data beyond the intended memory buffer, leading to potential memory corruption. This could result in browser crashes or the execution of malicious code on users’ devices without their consent.

The second vulnerability, CVE-2026-3910, pertains to an "inappropriate implementation" in V8, the high-performance JavaScript and WebAssembly engine that powers Chrome. Flaws in critical components like V8 can enable threat actors to manipulate browser memory and run unauthorized scripts, often bypassing security measures designed to shield users from cyber threats.

Google has confirmed that both vulnerabilities are currently being exploited in real-world attack scenarios, fueling concerns over security and prompting an increase in user vigilance. The nature of these vulnerabilities is such that they can be triggered merely by convincing a user to visit a specially crafted malicious website, and no further interaction is required.

Access Restrictions for Technical Details

To minimize potential abuse of these vulnerabilities, Google has strategically chosen to withhold some technical details from the public until a significant portion of users have successfully updated their browsers. This decision emphasizes the seriousness of the threats and aims to discourage potential attackers from exploiting the vulnerabilities before users can secure their systems.

Recommended Action Steps and Mitigation Strategies

Given the severity of the situation, it is crucial for users and system administrators alike to act promptly. Google is rolling out fixed versions of the Chrome browser gradually, and it is imperative for users to pay close attention to these updates.

For Windows and Mac users, the recommended update is to Chrome version 146.0.7680.75 or 146.0.7680.76, while Linux users should ensure their browsers are updated to version 146.0.7680.75. Additionally, users of other Chromium-based browsers, such as Microsoft Edge, Brave, or Vivaldi, are urged to check for and apply updates from their respective vendors.

Updating Google Chrome can be done manually by navigating to the Chrome menu, selecting “Help,” and then clicking on “About Google Chrome.” Upon doing so, the browser will automatically check for the latest updates and prompt users to restart to safely implement the patch.

Importance of Rapid User Patching

While Google employs advanced testing frameworks, such as AddressSanitizer and MemorySanitizer, to identify and mitigate flaws internally, the importance of rapid user patching cannot be overstated. Users who fail to apply these important updates remain vulnerable to active zero-day exploitation, making swift action essential for personal and organizational security.

In conclusion, this urgent security update serves as a vital reminder of the ever-evolving landscape of cyber threats. Users are once again called upon to remain proactive regarding their digital security, emphasizing the need for vigilance in a time when cybercriminal activities are on the rise. Following these guidelines will greatly enhance protection against potential exploits while demonstrating a commitment to safeguarding personal and organizational information in an increasingly hazardous digital age.

Source link

Latest articles

Hive0163 Employs AI-Driven Malware for Ransomware Attacks

In an alarming development, cybersecurity experts have identified a new form of malware called...

Google Addresses Two Chrome Zero-Day Vulnerabilities

Google Issues Urgent Security Updates to Address Two High-Severity Vulnerabilities in Chrome In a proactive...

Starbucks Reports on Employee Data Breach

Starbucks Faces Data Breach Affecting Employee Accounts Starbucks, known as the world’s largest coffeehouse chain,...

Apple Releases Emergency iOS 15.8.7 Update to Combat Coruna Exploit Kit

Apple Inc. has recently issued an urgent security update, denoted as iOS 15.8.7 and...

More like this

Hive0163 Employs AI-Driven Malware for Ransomware Attacks

In an alarming development, cybersecurity experts have identified a new form of malware called...

Google Addresses Two Chrome Zero-Day Vulnerabilities

Google Issues Urgent Security Updates to Address Two High-Severity Vulnerabilities in Chrome In a proactive...

Starbucks Reports on Employee Data Breach

Starbucks Faces Data Breach Affecting Employee Accounts Starbucks, known as the world’s largest coffeehouse chain,...