Google has published a security advisory against a new, critical 0-day vulnerability in the Google Chrome browser. The vulnerability, tracked as CVE-2022-3075, is a high-severity vulnerability that is caused by insufficient data validation in Mojo. This vulnerability can be exploited by attackers to bypass security restrictions. All Chrome users need to fix this vulnerability before they face any consequences. Due to the need to fix the issue, we will highlight how to Fix CVE-2022-3075- A New 0-day in Google Chrome Browser.
Mojo is defined as “a collection of runtime libraries that provide a platform-agnostic abstraction of common IPC primitives, a message IDL format, and bindings library with code generation for multiple target languages to facilitate convenient message passing across arbitrary inter- and intra-process boundaries.“
To run high-level support libraries, including the System APIs or Binding APIs, you must initialize Mojo Core first. Some platforms also enable applications to depend on a dynamically linked Mojo Core library. To benefit from this, the library’s binary should be present in one of the following.
The working directory of the application
A directory named by the MOJO_CORE_LIBRARY_PATH environment variable
A directory named at the run time explicitly by the application.
The CVE-2022-3075 is one of the high-severity vulnerabilities that can persuade victims to visit a specially crafted website. By doing so, an attacker can exploit this vulnerability and bypass security. As of now, not many details have been revealed about the CVE-2022-3075 by Google. It will reveal the root cause of the vulnerability and its implications in the coming weeks.
Until then, we only know that the vulnerability is related to an insufficient data validation issue in Mojo, as reported by Google Advisory. Let’s see how to fix CVE-2022-3075 – a New 0-day in Google Chrome Browser in the coming sessions.
Google has responded to this flaw by releasing an updated version of the Google Chrome Browser. Google recommends Chrome users update their vulnerable versions to the fixed Chrome version to avoid any consequences.
The updated version released by Google is Chrome 105.0.5195.102. Chrome users are advised to install the security update immediately on whatever OS they use, including Windows, Mac, and Linux.
More technical details about the attacks that can occur by exploiting this vulnerability are to be released by Google in the coming weeks. Until then, users must install the Chrome update to prevent threat actors from exploiting the flaw.
Chrome browser normally runs updates in the background when you close and then reopen your browser. However, if you haven’t done this in a while, a pending update might be available in a colored icon.
Different colors show how long it’s been since the update was released. The green color means an update was released less than two days ago. The orange color shows the release of the update almost four days ago, and the red color means it has been at least a week. Follow the steps to update your Chrome browser to its latest version.
Open Chrome browser on your computer.
At the top right corner of your browser, click More. A drop-down menu will appear.
In the drop-down menu, click HELP and go to About Google Chrome.
Click on Update Google Chrome.
Note: If you can’t find the update button, it means you’re on the latest version of the Chrome browser.
Click Relaunch.
Your browser will be updated to the latest version which has fixed the issue. If you have deployed the offline installation package, you can manually download the updated version to upgrade your browser. We hope this post helped you how to fix CVE-2022-3075- A New 0-day in Google Chrome Browser.
Please share this post if you find this interested. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
How to Fix CVE-2022-3075- A New 0-day in Google Chrome Browser
14 New Chrome 0-Day Vulnerabilities – Update Your Chrome Immediately
10 New 0-Day Vulnerabilities in Chrome - Update Your Browser ASAP
How To Fix CVE-2022-4135- A Heap Buffer Overflow in GPU Component of Chrome
How to Fix CVE-2022-4262- A Type Confusion Bug in the V8 JavaScript Engine in Chrome
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.