Google Chrome users are urged to take immediate action as a severe vulnerability has been identified in the popular web browser. This particular security flaw, categorized as CVE-2023-7024, is a heap buffer overflow within WebRTC, as disclosed by Google. The gravity of the situation is compounded by the fact that the vulnerability is not only known but is actively being exploited by malicious entities.
Heap buffer overflows, such as the one affecting Google Chrome, involve attackers causing a section of memory to overflow, creating an opportunity for exploitation. Google has officially confirmed the existence of an exploit for this vulnerability, making it a pressing concern for users.
To safeguard against potential security breaches, users are advised to ensure their Chrome browser is updated to version 120.0.6099.130 on Windows PCs, or alternatively, version 120.0.6099.129 for Mac or Linux. Taking prompt action is crucial, as failure to update may leave systems exposed to exploitation.
To check and update Chrome, users can access the Settings page by clicking the three-dot menu in the top-right corner of the browser. From there, navigate to the left-side panel and select ‘About Chrome’ at the bottom of the list. This action will automatically check for updates and apply any necessary upgrades.
It’s important to note that after the update, users must close all instances of the Chrome browser and reopen it to ensure the upgrade is applied. Failure to address this vulnerability promptly may result in compromised security, so users are strongly advised to verify their browser version without delay.