Cloud Security

Google Patches More Under-Attack Chrome Zero-days

Google’s problems with in-the-wild Chrome browser zero-days appear to be multiplying by the month.

<p><span><strong><span>Google’s problems with in-the-wild Chrome browser zero-days appear to be multiplying by the month.</span></strong></span></p>

Google’s problems with in-the-wild Chrome browser zero-days appear to be multiplying by the month.

The latest confirmation of this appears today with a new Chrome point-update to patch a pair of security vulnerabilities affecting Windows, MacOS and Linux users. Google said it was aware of reports that both of these vulnerabilities – CVE-2021-21206 and CVE-2021-21220 — are being exploited in the wild.   

As has become normal, Google did not provide any other details on the attacks or provide any IOCs to help organizations find signs of infection.

[ SEE: Sophisticated APT Group Burned 11 Zero-Days ]

The company confirmed that one of the bugs — described as “insufficient validation of untrusted input in V8 for x86_64” — was part of an exploit chain demonstrated at last week’s Pwn2Own marketing contest.

The second under-attack bug is currently documented simply as a use-after-free memory corruption vulnerability in Blink, the rendering engine used in Chrome.  Google said the bug was reported anonymously.

So far in 2021, Google has rushed out fixes for at least three separate in-the-wild zero-day attacks.

Related: Google Chrome Zero-Day Under Attack, Again

Advertisement. Scroll to continue reading.

Related: Google Chrome, Microsoft IE Zero-Days in Crosshairs

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version