![]() ![]() It was revealed today by Google TAG's Maddie Stone that the zero-day vulnerability CVE-2023-5217 had been exploited to install spyware on a computer. The Google TAG researchers are known for finding and reporting zero-day vulnerabilities that have been exploited in targeted spyware attacks by state-sponsored threat actors and hacking groups targeting high-risk individuals such as journalists and opposition politicians. On September 25, Google Threat Analysis Group (TAG) security researcher Clement Lecigne reported the bug. There is a high-severity zero-day vulnerability (CVE-2023-5217) in the VP8 encoding of the open-source libvpx video codec library, which could lead to app crashes and arbitrary code execution. Google Chrome 1.132, available worldwide in the Stable Desktop channel, addresses the security vulnerability.Īs stated in the advisory, it will likely take days or weeks for the patched version to reach the entire user base, however when BleepingComputer checked for updates, the update was available immediately.Īs soon as the web browser is launched, it will automatically check for and install any new updates available.Īttacks Chrome using spyware have exploited this vulnerability Retrieved from Īs part of its emergency security updates released today, Google has patched the fifth Chrome zero-day vulnerability exploited in attacks since the beginning of the year.Īn exploit for CVE-2023-5217 is known to exist in the wild, Google revealed in a security advisory published on Wednesday. ![]() ![]() APA style: In 2023, Chrome Zero-Day Has Been Exploited For The Fifth Time.In 2023, Chrome Zero-Day Has Been Exploited For The Fifth Time." Retrieved from MLA style: "In 2023, Chrome Zero-Day Has Been Exploited For The Fifth Time." The Free Library. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |