Get in Touch
Google have released an update to the Google Chrome web browser that addresses a number of vulnerabilities.
Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the browser. Depending on the privileges associated with the application, an attacker could view, change, or delete data.
Are my systems vulnerable?
Windows, Mac and Linux devices running Google Chrome versions prior to 92.0.4515.131 are affected.
Vulnerabilities exist in Google Chrome versions prior to 92.0.4515.131. If your version is below this, the system is vulnerable.
Containment, Mitigations & Remediations
Apply the stable channel update provided by Google to vulnerable systems immediately after appropriate testing.
Don’t use administrative accounts to browse the internet.
Do not to visit untrusted websites, follow links provided by unknown or untrusted sources, or suspicious links provided by known sources.
Apply the Principle of Least Privilege to all systems and services.
Indicators of Compromise
There are no IoC’s available at this time.
There are currently no reports of this vulnerability being exploited in the wild.