Lifehack logo

Critical Vulnerabilities in Google Chrome: CERT-In Urges Immediate Updates

Critical Vulnerabilities in Google Chrome

By Golu KumarPublished 12 months ago 3 min read
Critical Vulnerabilities in Google Chrome

Critical vulnerabilities in Google Chrome have put a question mark on the security of the globally-used web browser. There are multiple vulnerabilities which have put users at considerable risk. The Indian Computer Emergency Response Team (CERT-In) has issued urgent advisories regarding these flaws and urged users to update their browsers to the latest versions immediately. These vulnerabilities could potentially be used by a remote attacker to execute arbitrary code or cause DoS conditions; thus, this requires users to take action with urgency.

Google Chrome Vulnerabilities in the Recent Past

During the last year, CERT-In found several vulnerabilities within different versions of Google Chrome. Here are a few of the most critical issues reported:

1. December 2024 Vulnerabilities (CIVN-2024-0356)

CERT-In identified vulnerabilities in Google Chrome versions prior to 131.0.6778.139/.140 for Windows and Mac and 131.0.6778.139 for Linux. The primary issues included:

  • Type confusion in V8, Chrome’s JavaScript engine.
  • Use-after-free vulnerability in the Translate component.

These vulnerabilities could allow attackers to execute remote code or cause DoS conditions, compromising the targeted system’s security.

2. October 2024 Vulnerabilities (CIVN-2024-0318)

Another critical set of vulnerabilities was found in versions before 129.0.6668.89/.90 for Windows and Mac and 129.0.6668.89 for Linux. These included:

  • Integer overflow in the Layout component.
  • Insufficient data validation in Mojo, a collection of runtime libraries.
  • Type confusion and inappropriate implementation in V8.

Exploitation of these vulnerabilities could also lead to remote code execution, exposing sensitive user data.

3. April 2024 Vulnerabilities (CIVN-2024-0123)

Prior to this, CERT-In reported vulnerabilities in earlier versions than 123.0.6312.122/.123 for Windows and 123.0.6312.122/.123/.124 for Mac. The critical vulnerabilities were the following:

  • There was an out-of-bounds write in the Compositing component.
  • A heap buffer overflow in ANGLE, a graphics engine.
  • There was a use-after-free vulnerability in the Dawn component. These also had the possibility of creating DoS conditions or giving the control of a user's system to attackers.

Consequences of the Vulnerabilities

The discovered vulnerabilities present a major threat to users as well as the organizations. These flaws may be exploited by the remote attackers for unauthorized access, data theft, or other activities that cause disturbances. Considering that Google Chrome is extensively used in various platforms, the impact of the discovered flaws would be highly influential. The hackers may exploit these flaws for ransomware attacks, phishing scams, and other malicious operations.

Countermeasures

CERT-In has advised the users and organizations to take necessary steps immediately to protect their systems. Here are some crucial steps that would help mitigate the risks:

1. Update to the Latest Version

Users should update their Google Chrome browser to the latest version available. Updates not only fix known vulnerabilities but also enhance overall performance and security.

2. Turn on Automatic Updates

The user should allow updating automatically by enabling the option in the browser setting. This eliminates the possibility of missing critical updates so that the browser remains updated automatically without any manual intervention.

3. Track Official Channels

Users are advised to track the official Google Chrome release blog and CERT-In's advisories for the latest updates related to vulnerabilities and patches.

  • Stable Channel Update for Desktop - December 2024
  • Stable Channel Update for Desktop - October 2024
  • Stable Channel Update for Desktop - April 2024

Deploy Endpoint Protection Organizations should deploy strong endpoint protection solutions to monitor and block suspicious activities. Implementing a holistic cybersecurity strategy will be able to help reduce the risk of threats arising from browser vulnerabilities.

Conclusion

Recent vulnerabilities with Google Chrome indicate the importance of keeping the updated software in store. With rapidly changing cyber attacks, staying sharp and proactive towards applying security patches is very vital to ensure protection and safety for one's digital asset. The process requires a good response from individuals and organizations where they must get their browsers upgraded and adhere to the best practices in light of such exposures.

With over a billion users worldwide, Google Chrome's security is paramount. By addressing these vulnerabilities, users can ensure a safer browsing experience and protect themselves from potential cyberattacks.

social mediatechproduct review

About the Creator

Golu Kumar

Golu Kumar is a skilled content writer specializing in creating engaging, informative, and high-quality written materials. With a keen eye for detail and a passion for storytelling.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2026 Creatd, Inc. All Rights Reserved.