Google swiftly responded to a high-severity vulnerability in Chrome, marked as CVE-2024-5274, which was exploited in the wild, making it the fourth zero-day patched in two weeks. The flaw, identified as a type confusion in the V8 JavaScript and WebAssembly engine, posed a significant risk to users’ browsing security. Although Google didn’t provide specific details about the bug or its exploitation, it credited Clement Lecigne of Google’s Threat Analysis Group (TAG) and Brendon Tiszka of Chrome Security for reporting it.
Notably, Chrome vulnerabilities are frequently targeted by commercial surveillance software vendors, highlighting the critical importance of prompt patching. Google’s quick response underscores its commitment to addressing security threats efficiently. This particular zero-day is part of a series of recent patches, including CVE-2024-4671, CVE-2024-4761, and CVE-2024-4947, emphasizing the ongoing efforts to fortify Chrome’s defenses against emerging cyber threats.
The Chrome update, rolled out as version 125.0.6422.112 for Linux and versions 125.0.6422.112/.113 for Windows and macOS, contains crucial security fixes. Additionally, Google announced the release of Chrome for Android versions 125.0.6422.112/.113, ensuring that mobile users also benefit from enhanced security measures. Users are strongly advised to update to the latest Chrome releases promptly to mitigate the risk of exploitation and protect their browsing activities from potential threats.