top of page

Government Alerts Google Chrome Users to Critical Risks, Urges Immediate Browser Update

In a recent development, the Computer Emergency Response Team of the Indian government (CERT-In), an agency functioning under the Ministry of Electronics and Information Technology, has issued an urgent warning to users of Google Chrome. The advisory comes in response to high-severity vulnerabilities detected within specific versions of the web browser, exposing users to the potential dangers of phishing attacks, data breaches, and malware infiltrations.

CERT-In's cautionary message underscores the potential security pitfalls that Chrome users may encounter, leaving their sensitive data vulnerable to compromise. These risks encompass a range of threats, including but not limited to phishing attacks, unauthorized data access, and malicious software installations. Vigilance on the part of users is paramount, along with the implementation of requisite protective measures.

Understanding the High-Severity Threat

The intricate landscape of Google Chrome harbors several vulnerabilities capable of granting malicious actors control over users' computing systems. These vulnerabilities manifest across various facets of Chrome's architecture, spanning prompts, the Web Payments API, SwiftShader, Vulkan, Video, and WebRTC. Additionally, there exists susceptibility to heap buffer overflow in Video and integer overflow in PDF, further accentuating the risk.

Elaborating on the technical aspects, the official notice cites "Multiple vulnerabilities exist in Google Chrome due to Type Confusion in V8; Heap buffer overflow in Visuals; Out of bounds read and write in WebGL; Out of bounds memory access in ANGLE; Use after free in Blink Task Scheduling, Cast and WebRTC; Insufficient data validation in Extensions and Inappropriate implementation in Extensions."

A notable concern lies in the potential exploitability of these vulnerabilities through the act of luring users to malicious websites. Visiting such sites opens the gateway for attackers to commandeer users' systems, thereby gaining unauthorized access to personal information and data.

Identification of Affected Versions and Remedial Steps

CERT-In has succinctly outlined the affected Chrome versions susceptible to these vulnerabilities. Users employing the following versions are urged to take immediate remedial action:

  • Google Chrome versions preceding 115.0.5790.170 for Linux and Mac

  • Google Chrome versions preceding 115.0.5790.170/.171 for Windows

To fortify device security, CERT-In proposes the prompt update of Google Chrome to the latest iteration. Google has expedited the release of updates aimed at rectifying these vulnerabilities.

Updating Chrome involves the following steps:

  1. Launch Google Chrome.

  2. Click on the three dots situated in the top right corner of the window.

  3. Navigate to Help > About Google Chrome.

  4. If an update is available, Chrome will initiate the download and installation automatically.

  5. Upon successful installation, Chrome will reboot.

Alternatively, manual checks for updates can be carried out using these steps:

  1. Open Google Chrome.

  2. Click on the three dots located in the top right corner of the window.

  3. Proceed to Help > About Google Chrome.

  4. Click on Check for updates.

Supplementary Security Measures

Beyond the update process, several supplementary security practices warrant adherence to protect devices from potential online vulnerabilities:

  • Exercise prudence while selecting websites to visit and links to click on. Exercise caution when unsure of a website's safety.

  • Harness the power of a robust password manager to create and store potent passwords for all online accounts.

  • Opt for two-factor authentication (2FA) when offered by online platforms.

  • Exercise discretion when divulging personal information online, particularly on social media.

  • Maintain current versions of operating systems and software, incorporating the latest security patches.

  • Bolster defense mechanisms through the use of firewalls and reputable antivirus software.

By implementing these measures, users can ensure enhanced protection against evolving online threats, safeguarding their digital experience..!!

7 views0 comments


bottom of page