Chrome 72.0.3626.121 Addresses A Zero-Day Vulnerability – Update Your Chrome, ASAP!

Chrome 72.0.3626.121 is the most recent version of the popular browser. It rolled out last week, and security experts advise users to download it as soon as possible in order to address a zero-day vulnerability. The security flaw was discovered around the end of February, and it looks like attackers were already trying to exploit it.

Google security engineers are talking about a zero-day vulnerability. According to them, the security flaw can interfere with Chrome’s functionality and users’ privacy in several operating systems: Linux, Mac, and Windows. Immediately after the news about the security hole became public, Justin Schuh, lead engineer from Chrome’s online safety team, announced that users should hurry up and update their browsers.

The most recent Chrome 72.0.3626.121 update addresses a zero-day vulnerability

In case you are wondering what the zero-day vulnerability is all about, you should know that the name describes a memory corruption bug that can be found in the FileReader API from Google’s browser. That is the component that helps applications from the web read files which are stored locally. If the bug is exploited, the affected users can experience more trouble than initially estimated.

The Centre for Internet Security (CIS) released a note stating that hackers might even use it for executing arbitrary codes on a system remotely. In this case, the attacker could install or delete programs, data and also create a different account with the same administration rights as the actual holder.

In conclusion, Chrome users should stay away from doubtful pages and download the latest version of their browser. In case you are not sure that you have updated to Chrome 72.0.3626.121, check and see which version you’re using. Go to the browser’s Settings and into the Help category. If the browser is outdated, start the download and install process.

You May Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *