There is an advisory from Google for those who have been using Chrome OS. In the advisory, Google mentioned 14 new 0-day vulnerabilities in Chrome OS and asked users to upgrade the operating system as soon as possible.
Google has fixed these vulnerabilities by rolling out an update on the 31st of August. Well, the company hasn’t notified any traces of active exploitation in the wild. The advisory has a list of 14 vulnerabilities, of which 4 are identified as high, and the remaining 10 are medium in severity. The reported vulnerabilities would be abused to carry out arbitrary code execution and denial of service attacks on the vulnerable version of Chrome OS by remote attackers.
In the update Google shared, it has fixed these 14 0-day vulnerabilities in Chrome OS, of which 4 is High, and the remaining 10 are Medium in severity. Please see the list as under. Successful exploitation could lead to arbitrary code execution and denial of service attacks on the vulnerable version of ChromeOS by remote attackers.
CVE-2022-2857: It is a High severity vulnerability in Blink
CVE-2022-2998: It is a High severity vulnerability in Browser Creation
CVE-2022-2607: It is a High severity vulnerability in WebUI
CVE-2022-2606: It is a High severity vulnerability in Managed devices API
CVE-2022-2859: It is a Medium severity vulnerability in Chrome OS Shell
CVE-2022-2860: It is a Medium severity vulnerability due to insufficient policy enforcement in Cookies.
CVE-2022-2861: It is a Medium severity vulnerability due to inappropriate implementation in Extensions API
CVE-2022-2624: It is a Medium severity Heap buffer overflow vulnerability in PDF
CVE-2022-2614: It is a Medium severity vulnerability in Sign-In Flow
CVE-2022-2621: It is a Medium severity vulnerability in Extensions
CVE-2022-2612: It is a Medium severity Side-channel information leakage vulnerability in Keyboard input
CVE-2022-2620: It is a Medium severity vulnerability in WebUI
CVE-2022-2615: It is a Medium severity vulnerability due to insufficient policy enforcement in Cookies
CVE-2022-2617: It is a Medium severity vulnerability in Extensions API
It’s been said that all the LTS versions prior to 96.0..4664.219 (Platform Version: 14268.104.0).
Google responded and released updates on 31st August to fix all the 14 New 0-Day Vulnerabilities in Chrome OS. All the Chrome OS users are suggested to upgrade to v96.0..4664.219 (Platform Version: 14268.104.0). Please refer to the security advisory by Google.
Well, Chrome OS is designed to fetch upgrades by itself. Most of the time, auto-upgrade will work. Your Chrome OS didn’t receive upgrades for any reason, and you will have to kick start the process manually. Then you can follow any one of the methods shown here.
Click on the Settings icon on the Task Bar.
Choose the ‘About Chrome OS‘.
Click on ‘Check for Updates‘. The upgrade process will get started if your OS is connected to the internet.
For some reason, if auto-upgrade didn’t get fired up. Follow the Method 2.
Click Crtl + Alt + T and keys together to open Crosh Shell.
Enter ‘shell‘ command to open the shell.
Use this curl command to download brcr-update as shone here:
$ curl -L -o – https://git.io/JLh1V | sudo bash
Run this command. That’s it.
$ brcr-update
Download the latest Brunch release and the latest recovery matching your install and extract the bin.
Click Crtl + Alt + T and keys together to open Crosh Shell.
Update the Brunch using the following command:
$ sudo chromeos-update -r ~/Downloads/<path to recovery filw> -f ~/Downloads/<path of brunch archive file>
4. Restart the Chrome OS.
This is the easiest way to upgrade the Chrome OS. All you need to do enable_updates
framework option, then carry out the upgradation from the ‘Settings’ as shown in Method 1. This is not the recommended method.
Click Crtl + Alt + T and keys together to open Crosh Shell.
Open the Brunch Configuration Menu using the below command:
$ sudo edit-brunch-config
3. Add enable_updates
as shone in the picture. Save the changes.
Reboot the Chrome OS.
Click on the Settings icon on the TaskBar.
Choose the ‘About Chrome OS‘.
Click on ‘Check for Updates‘. The upgrade process will get started if your OS is connected to the internet.
Watch this video created by
.
Source:
We hope this post would help you know how to patch the 14 new 0-day vulnerabilities in Chrome OS. Please share this post if you find this interested. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
14 New 0-Day Vulnerabilities in Chrome OS – Update Your Chrome OS ASAP
14 New Chrome 0-Day Vulnerabilities – Update Your Chrome Immediately
10 New 0-Day Vulnerabilities in Chrome - Update Your Browser ASAP
How to Fix CVE-2022-3075- A New 0-day in Google Chrome Browser
How To Fix CVE-2022-4135- A Heap Buffer Overflow in GPU Component of Chrome
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.