Google Patches 5th Zero-Day Vulnerability in Chrome 117.0.5938.132

The zero-day exploit CVE-2023-5217 is now fixed in Google Chrome.

Google Is Testing New Homepage Design Similar to News-Focused Interfaces of Rivals Bing, Yahoo
Google was seen testing a news-filled homepage in India similar to its rivals Bing and Yahoo. Nathana Rebouças from Unsplash

Google has acted swiftly to address the fifth zero-day vulnerability in Chrome that has been exploited in attacks since the beginning of this year.

In an emergency security update released recently, the company released a patch for the security flaw on Chrome 117.0.5938.132.

Fifth Zero-Day on Google Chrome Gets Patched

In a report by Bleeping Computer, Google fixed the most recent zero-day exploit in the system dubbed "CVE-2023-5217."

In a security release that Google wrote on Wednesday, Sept. 27, the vulnerability was described as existing "in the wild." If the company did act immediately to solve the issue, cybercriminals would take advantage of its weakness.

Global Rollout of Security Patch in Chrome 117.0.5938.132

Google says that the patch has been launched worldwide for users with Google Chrome version 17.0.5938.132. It's available not just on Windows but also on other OS such as Linux and Mac via the Stable Desktop channel.

There's no assurance that all users will receive the patched version of Chrome within a single day. While the update won't reach other users, they can always check if there are changes in the announcement.

Automated Updates for Enhanced Security

As part of its security measures, Google's web browser regularly checks for new updates and, in most cases, will automatically install them upon the next browser launch. This automated approach ensures that users benefit from the latest security enhancements without any significant effort.

Related Article: Chrome Zero-Day Vulnerability: North Korean Hackers Bring Threats to US Targets, Same One in Past Years

Understanding the Severity of CVE-2023-5217

The zero-day vulnerability, CVE-2023-5217, is categorized as high-severity. It stems from a heap buffer overflow weakness found in the VP8 encoding of the open-source libvpx video codec library. This type of vulnerability can have a wide-ranging impact, from causing application crashes to enabling attackers to execute arbitrary code on affected systems.

According to Hacker News, here are the four zero-day vulnerabilities that were fixed previously.

The zero-day vulnerability was originally identified by Clément Lecigne, a security researcher with Google Threat Analysis Group (TAG).

The security community respects TAG researchers for their role in discovering and reporting zero-days, often exploited in targeted attacks by government-sponsored threat actors.

The seriousness of this zero-day is highlighted by the fact that it has already been exploited in the wild to install spyware on targeted systems. However, Google has not yet shared detailed information about the specific incidents or the extent of this exploitation.

Proactive Measures for User Safety

By releasing an emergency patch, Google has taken a proactive approach to protect Chrome users from potential attacks, leveraging this zero-day. This approach can be crucial in minimizing the risk of threat actors developing and using their own exploits in real-world scenarios, especially as more technical details of the vulnerability become available.

Joseph Henry
Tech Times
ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion
Real Time Analytics