CERT-in Issues Warning for Google Chrome OS Users Due to Multiple Vulnerabilities

CERT-in Issues Warning for Google Chrome OS Users Due to Multiple Vulnerabilities

Computer Emergency Response Team (CERT-in) has issued a new warning for Google’s Chrome OS users. Multiple new vulnerabilities have been found in Google’s operating system — Chrome OS — that powers Chromebook laptops. CERT-in has updated its official website with the latest warning and has confirmed the software version that has been affected along with a list of vulnerabilities found within the Chrome OS operating system.

The government body has said that “Multiple Vulnerabilities have been reported in Google Chrome OS which could be exploited by a remote attacker to execute arbitrary code, gain elevated privileges, bypass security restrictions or cause denial of service conditions on the targeted system.”

According to a report, these vulnerabilities exist in Google Chrome OS due to Use after free in Side Panel Search. Insufficient data validation in Extensions. A remote attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted web page.

Google Chrome OS LTS channel version prior to 114.0.5735.350 (Platform Version: 15437.90.0) is affected by these vulnerabilities.

CERT-In, the Indian cybersecurity agency, issues a crucial advisory, recommending users to enhance their system security by applying necessary patches. Google has swiftly responded by releasing an update that includes fixes for identified vulnerabilities. To safeguard against potential threats, it is imperative for Chromebook users to proactively download and install the latest version. This proactive approach ensures the maintenance of the security integrity of devices, aligning with best practices to thwart cybersecurity risks. Stay protected by promptly updating your Chromebook and fortifying your digital environment against emerging threats.

Tags: , , , , ,

TIS Staff

wp_ghjkasd_staff

Leave a Reply

Your email address will not be published. Required fields are marked *