Google has released emergency updates to fix another Chrome zero-day vulnerability exploited in the wild, the eighth patched since the start of the year.
The company fixed the zero-day bug for users in the Stable Desktop channel, with patched versions rolling out worldwide to Windows users and Mac and Linux users one day after being reported to Google.
The bug was discovered and reported by Clément Lecigne and Vlad Stolyarov of Google's Threat Analysis Group, a collective of security experts whose primary goal is to defend Google customers from state-sponsored attacks.
Google's Threat Analysis Group frequently discovers zero-day bugs exploited by government-sponsored threat actors in targeted attacks aiming to deploy spyware on the devices of high-risk individuals, including opposition politicians, dissidents, and journalists.
Even though the security update could take days or weeks to reach all users, according to Google, it was available immediately when BleepingComputer checked for updates earlier today.
Individuals who prefer not to update manually can rely on their web browser to automatically check for new updates and install them upon the next launch.
The high-severity zero-day vulnerability is due to a heap buffer overflow weakness in the open-source WebRTC framework many other web browsers and mobile apps use to provide Real-Time Communications capabilities via JavaScript APIs.
While Google knows that CVE-2023-7024 was exploited as a zero-day in the wild, it has yet to share further details regarding these incidents.
This aims to reduce the likelihood of threat actors developing their own CVE-2023-7024 exploits by preventing them from taking advantage of newly released technical information.
Like CVE-2023-4762, were tagged as zero-day bugs used to deploy spyware weeks after the company released patches.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Wed, 20 Dec 2023 21:45:14 +0000