Date: September 29, 2023
CERT-In has identified potential risks for users of Google Chrome that can lead to multiple vulnerabilities regarding their sensitive information. Read more.
Are you a daily user of Google Chrome? More than a million people use Google Chrome for a wide range of activities, from searching for something basic to making secure transactions globally. However, India's Computer Emergency Response Team, a government authority, has raised a high alert for all Google Chrome users to prevent a mass security breach. The warning comes from discovering multiple vulnerabilities that could potentially open doors for hackers, spammers, and DDOS agents. CERT-In is urging Google Chrome to take immediate action regarding mitigation steps for these vulnerabilities.
People use Google Chrome for various needs. While some do not require us to enter our sensitive information, a lot do. Considering the normalization of online transactions, data sharing, and exchange of sensitive information over the internet with a nothing-will-happen mindset, the CERT-In finds these vulnerabilities a grave threat. These vulnerabilities could bypass security gates, execute arbitrary code, or lead to denial of service actions without notice. These actions can cause multiple forms of harm, from spamming to leaking money and personal data to unsolicited markets.
According to sources, the flaws in Google Chrome’s various extensions in some of the versions include a Heap buffer overflow error in WebP, inappropriate implementation in Custom Tabs, Prompts, Input, Intents, Picture in Picture, and Interstitials, as well as insufficient policy enforcement in Downloads and Autofill. Cybercriminals can easily access the data using these flaws and take advantage.
While CERT-In has urged the Google team to take all the latest versions of the app in cognizance, a particular set of prior versions are prone to these threats easily.
CVE-2023-4863 is a vulnerability that’s being actively exploited in the wild. The software versions of Google Chrome vulnerable to these are:
If you use Google Chrome to store personal and sensitive data, keeping them off the platform would be the best first step. For starters, remove all history, cookies, and personal data from the platform. Use a secure alternative payment gateway for transactions. The next step would be to update Google Chome to the latest version, automatically eliminating the security risks associated with prior versions. Use incognito mode to browse websites where you can potentially enter your personal data. Wait for the Google Chrome team’s notice regarding their steps, and try to minimize usage till then for preventive safety.
By Arpit Dubey
Arpit is a dreamer, wanderer, and tech nerd who loves to jot down tech musings and updates. Armed with a Bachelor's in Business Administration and a knack for crafting compelling narratives and a sharp specialization in everything from Predictive Analytics to FinTech—and let’s not forget SaaS, healthcare, and more. Arpit crafts content that’s as strategic as it is compelling. With a Logician mind, he is always chasing sunrises and tech advancements while secretly preparing for the robot uprising.
Apple Taps Anthropic to Supercharge Xcode with AI-Powered Coding Assistant
Apple collaborates with Amazon-backed Anthropic to create a next-gen AI assistant for Xcode, aiming to revolutionize how developers write, edit, and test code through an intuitive “vibe-coding” experience.
How Much Does a Digital Marketing Agency Cost?
Discover the factors that manipulate the marketing agency costs and drive you to hefty bills. Observe and plan smartly! We got some tips too.
Quantum Leap: Amaravati to Build India’s First Tech Village
Amravati’s quantum computing village, India’s first, pioneers a tech revolution with IBM, TCS, and L&T, fostering innovation in quantum research and collaboration.
Microsoft Goes Passwordless by Default, Pushing Passkeys Mainstream
Microsoft ditches passwords for new users—passkeys are in, friction is out. Is this the tech giants’ way of embracing smarter sign-ins?