Security Experts:

Google Patches More Under-Attack Chome Zero-days

Google’s problems with in-the-wild Chrome browser zero-days appear to be multiplying by the month.

The latest confirmation of this appears today with a new Chrome point-update to patch a pair of security vulnerabilities affecting Windows, MacOS and Linux users. Google said it was aware of reports that both of these vulnerabilities - CVE-2021-21206 and CVE-2021-21220 -- are being exploited in the wild.   

As has become normal, Google did not provide any other details on the attacks or provide any IOCs to help organizations find signs of infection.

[ SEE: Sophisticated APT Group Burned 11 Zero-Days ]

The company confirmed that one of the bugs -- described as “insufficient validation of untrusted input in V8 for x86_64” -- was part of an exploit chain demonstrated at last week’s Pwn2Own marketing contest.

The second under-attack bug is currently documented simply as a use-after-free memory corruption vulnerability in Blink, the rendering engine used in Chrome.  Google said the bug was reported anonymously.

So far in 2021, Google has rushed out fixes for at least three separate in-the-wild zero-day attacks.

Related: Google Chrome Zero-Day Under Attack, Again

Related: Google Chrome, Microsoft IE Zero-Days in Crosshairs

view counter
Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a journalist and cybersecurity strategist with more than 20 years experience covering IT security and technology trends. Ryan has built security engagement programs at major global brands, including Intel Corp., Bishop Fox and Kaspersky GReAT. He is a co-founder of Threatpost and the global SAS conference series. Ryan's career as a journalist includes bylines at major technology publications including Ziff Davis eWEEK, CBS Interactive's ZDNet, PCMag and PC World. Ryan is a director of the Security Tinkerers non-profit, and a regular speaker at security conferences around the world. Follow Ryan on Twitter @ryanaraine.