Immediately Update Your Google Chrome Browser to Patch Vulnerability

Immediately Update Your Google Chrome Browser to Patch Vulnerability

Always make sure your browsers, software programs, and computer operating systems are up-to-date in order to best protect yourself from vulnerabilities.

If you are reading this, there is a good chance you are doing so on a Chrome browser, based on the available market share data.

The kernel driver vulnerability could also serve for sandbox escaping when chained with other browser security faults, so Windows users could still be impacted even if they applied correctly the most recent update for Google Chrome.

The security researcher said that Google made a decision to go public with information about the Windows zero-day because they believe Windows 7 users should be aware of the ongoing attacks and take protective measures, just in case the attackers are using the Windows 7 zero-day in combination with exploits on other browsers.

We also know that it was reported by Clement Lecigne of Google's Threat Analysis Group a week ago (on February 27). And if that is the case, do yourself a solid and update Chrome, "like right this minute".

ZDnet reports that the hack exploited a security flaw named CVE-2019-5786, a patch to this issue was included in a version of Chrome released on March 1st; the version number was 72.0.3626.121.

If they haven't already, desktop Chrome users are urged to upgrade to v72.0.3626.121, Android users to v72.0.3626.121, and Chrome OS users to v72.0.3626.122. It's not safe to venture out there alone (or at least without the latest browser updates).

Unidentified attackers have been combining an exploit for the unpatched local privilege escalation in Windows with one for a separate security flaw in the Chrome browser that Google fixed last Friday.

Related Articles