Skip to content

New Google Chrome Update Patches Latest Exploit

Chrome users have had a tough year, as yet another zero-day exploit requires an urgent Google Chrome update. Anyone who hasn’t downloaded the latest patch is at high risk due to the severity of this threat. And with over 3.2 billion people using Google Chrome globally, that impacts a substantial number of people. Luckily, the update process is simple and quick, so most people shouldn’t have trouble doing it.

Download the Google Chrome Update ASAP

Before we go into too much detail about the threat, we encourage you to download the Google Chrome update before doing anything else. The vulnerability is a major risk to any Chrome user, whether the computer is used at home or at work. It’s also worth spreading the word to any coworkers and family members. In general, checking for updates at least once a month is also worthwhile.

How To Download the Latest Google Chrome Update

Downloading the latest Google Chrome update only takes a few simple steps:

Step 1. Open Google Chrome.

Step 2. Click “More” (the three vertical dots in the top right corner).

Step 3. Hover your mouse over “Help” near the bottom of the menu.

Step 4. Click “About Google Chrome,” and it’ll automatically download if there’s an update available.

Step 5. Click “Relaunch” after finishing the download.

Step 6. Repeat steps 1 through 4 to confirm you’re on Version 119.0.6045.199 (or later).

After that, you should be good to go. These steps can be repeated any time you want to check if there’s a new update to download. Like any software update, routinely checking for patches can help keep your devices safer.

CVE-2023-6345: The New Chrome Vulnerability

CVE-2023-6345 is a critical security flaw in Google Chrome that arose from an integer overflow in Skia. It’s a key graphics library used by the browser. Integer overflow happens when calculations exceed the maximum value the system can handle, leading to errors. This vulnerability is severe because it can allow attackers to disrupt or take control of systems. Given Skia’s central role in Chrome’s graphics processing, this vulnerability may also impact applications that rely on Chrome.

The vulnerability was uncovered by Benoît Sevens and Clément Lecigne, members of Google’s Threat Analysis Group (TAG). Google has confirmed active exploits of CVE-2023-6345 in the wild, indicating its use by attackers. As a zero-day threat, it’s been a high-priority fix that they pushed out as quickly as possible.

Other Google Chrome Zero-Day Exploits From 2023

CVE-2023-5217 (Heap Buffer Overflow in libvpx): A buffer overflow happens when more data is written to a buffer than it can hold. This libvpx video codec library flaw could let attackers run unauthorized commands or cause system crashes.

CVE-2023-4863 (Heap Buffer Overflow in libwebp): Similar to CVE-2023-5217, this vulnerability in the libwebp image library could allow excess data to overwrite adjacent memory. That could lead to code being executed on the target device.

CVE-2023-3079 (Type Confusion in V8): This involves the program mistakenly interpreting data of one type as another. That confusion in Chrome’s JavaScript engine V8 can cause system instability or allow attackers to execute code, undermining the browser’s integrity.

CVE-2023-2136: Specific details about this exploit are not provided, but it’s considered critical like the others. Details are often hidden when a vulnerability is a big enough threat that they want to decrease the chance of it being used.

CVE-2023-2033 (Type Confusion in V8): Another confusion issue in V8. It can lead to incorrect data processing, with potential outcomes ranging from application crashes to unauthorized code execution. That makes it a security threat, much like most zero-day issues.

Google’s Bounty Approach To Discovering New Threats

Google’s approach to uncovering new threats in its Chrome browser involves dedicated internal teams and a substantial community-driven effort through its bounty programs. These programs offer financial rewards to independent security researchers and the broader cybersecurity community for discovering and reporting vulnerabilities.

Collaborative Security Efforts

Google recognizes the importance of collaboration in cybersecurity. By engaging with external researchers, they tap into diverse expertise and perspectives. This approach not only hastens the discovery of vulnerabilities but also enriches Chrome’s overall security. In 2022, for example, Google’s Vulnerability Reward Program (VRP) received 470 unique security bug reports for Chrome, resulting in a total payout of $4 million. This figure shows Google’s commitment to working with external experts to bolster its browser security.

Financial Incentives and Rewards

Financial incentives play a crucial role in Google’s security strategy. The company offers competitive bounties for various classes of vulnerabilities. That encourages researchers to seek out and report significant security flaws. In a recent security update, for instance, bounties were awarded for several high-severity vulnerabilities, including a $31,000 reward for a ‘use after free’ issue in Mojo, reported by external researchers. Such substantial rewards motivate the discovery of vulnerabilities.

Evolution of the Bounty Program

Google continuously evolves its bounty program to adapt to emerging security challenges. Recently, the Chrome VRP re-evaluated and increased reward amounts for the most exploitable and harmful classes of security bugs. They also introduced new categories, such as memory corruption bugs in high-privilege processes, to focus efforts on critical security areas. Enhancements like these ensure that the bounty program remains effective and aligned with current cybersecurity landscapes.

Experimentation and Improvement

Looking ahead, Google plans to experiment with its Chrome VRP in 2023, suggesting potential new bonus opportunities and innovative approaches to security research. This forward-thinking mindset not only keeps the program dynamic but also aligns it with the ever-evolving nature of cyber threats.

Overall, combining financial incentives with collaborative efforts, Google’s bounty approach plays a pivotal role in discovering new threats. It accelerates flaw identification and fosters a community-oriented approach to cybersecurity. That makes it crucial in the continuous battle against digital threats.

The Importance of Google Chrome Updates

With so many vulnerabilities discovered in Google Chrome throughout the year, it’s a good reminder of how important it is to keep your browser and software patched. Each update not only patches existing security gaps but also fortifies the browser against potential new threats. That is especially vital when cyber threats are becoming more complex and difficult to notice. Updating your browser is a proactive step towards safeguarding your personal and professional devices from changing threats.

Moreover, Google Chrome’s updates are not just about security. They also bring performance enhancements, new features, and improved compatibility with the latest web technologies. This ensures a smoother, more efficient, and secure browsing experience. In essence, keeping up with Google Chrome updates is a simple yet effective way to ensure you’re getting the most out of one of the most popular web browsers.

Does your business need help with keeping your systems protected with the latest security patches? Reach out to us for a consultation via our contact form or call us at: +1 (800) 297-8293

Our Partners

Trusted by Partners Across the Country

Need IT Services? We Can Help!

ITonDemand delivers expert IT services tailored to meet your unique business needs. From cybersecurity to cloud solutions, we empower your organization to thrive in a digital world. You can rely on us for dependable support and innovative solutions.