Zero-Day Vulnerability: What Microsoft Edge And Google Chrome Users Need To Know
KEY POINTS
- Zero-day flaw operates when combined with PoC and HTML file
- The bug works on both Microsoft Edge and Google Chrome
- Users must keep their sandboxes on to keep their devices protected
Over the past two days, discussions about zero-day vulnerability have been rife on Twitter after two security researchers individually dropped remote code execution flaws that could work on Microsoft Edge and Google Chrome.
For the uninitiated, a zero-day remote code execution flaw is a security bug unveiled on previous versions yet remained unpatched on the latest update of the affected version. On April 13, Rajvardhan Agarwal, a security researcher, posted a Twitter update with a link to a zero-day vulnerability.
The term zero-day vulnerability apparently refers to the amount of time given to the software developers to fix the bug. The team behind Google had zero days to fix and prevent the exploit from spreading around in the wild.
Agarwal’s zero-day vulnerability works by launching the Windows calculator. However, in order to launch the program, the vulnerability needs to be exploited first by loading the proof of concept (PoC) HTML along with the JavaScript file on a Chromium-based browser.
The security researcher then claimed that the latest version of the V8 JavaScript engine brought fixes to the bug. Toms Guide confirmed that the latest Chrome version release patched the flaw.
Meanwhile, on April 14, a Twitter user with the handle “frust” posted an update saying “another chrome 0day,” with a link to another Github page with JavaScript for a proof of concept web page.
Almost similar to how Agarwal’s zero-day vulnerability works, frust’s demonstration, launches the Windows Notepad in Chrome. The bug specifically works on Chrome version 89.0.4389.128, its April 13 release.
No serious harm was spotted yet although the ability to launch a program on Windows should already cause concerns to some. Chances are if the bug is combined with another attack that can disable the security boundary, malicious websites could freely penetrate and launch programs on computers running on Microsoft Edge or Google Chrome Tom’s Guide reported.
Bleeping Computer clarified that Agarwal’s zero-day flaw cannot completely penetrate a host computer as it cannot surpass the Chrome sandbox -- a security boundary that prevents malicious processes from spreading into the surrounding operating system.
This means that in order to avoid the zero-day vulnerability, Google Chrome and Microsoft Edge users must keep their sandbox on.
© Copyright IBTimes 2024. All rights reserved.