Google released a round of security update for Chrome 113 for Windows, Linux, and Mac addressing yet another critical zero-day vulnerability. The update addresses a total of 12 vulnerabilities, the most severe of which could lead to arbitrary code execution. An attacker could use the flaw to gain full system access.
The released security updates are for Google Chrome users on Windows, macOS, and Linux, which include zero-day vulnerability:
CVE-2023-2721: Use after free in Navigation in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
Security Risks
Successful exploitation of the identified vulnerabilities could allow remote attackers to potentially execute arbitrary code by exploiting a use-after-free condition through a crafted HTML page. This can lead to system compromise, unauthorized access, and information theft. Users should update Chrome to version 113.0.5672.126 or later to mitigate the risk.
Recommended Actions
The National Cyber Security Authority (NCSA) recommends users and system administrators to:
1. Upgrade, as soon as possible, to the latest supported version of installed software in order to continue receiving technical support and security patches.