Google recently patched a zero-day vulnerability that has been exploited in the Chrome browser.
This zero-vulnerability in Chrome is referred to as a “type confusion in V8” and it’s being tracked under CVE-2020-6418.
According to Catalin Cimpanu of ZDNet, V8 is part of an intricate part of Google Chrome that processes JavaScript code.
Extracts from the Common Weakness Enumeration (CWE) website refers to a “type confusion” as the program that assigns a resource with just one type but is mislead into accessing a resource that is not corresponding to its initial type.
The recent patch is part of the latest updates om Chrome carrying the 80.0.3987.122 version for Mac, Linux and Windows users.
Also read, What Is The Safest & Most Secure Web Browser Available?
This recent update is the third in the sequence of the zero-day fixes executed by Google. In March 2019, the first zero-day vulnerability got patched and was part of the 72.0.3626.121 version of Chrome.
In a blog post composed by the Chrome team, “Google is aware of reports that an exploit for CVE-2020-6418 exists in the wild,”
Antti Tikkanen who is a part of the Google Threat Analyst Group also tweeted about the zero-day vulnerability patch.
Google has, however, not made it clear if malicious attempts have taken place on Chrome due to the recent vulnerability.
This vulnerability could give access to attempts in executing unlimited malicious code in an app.
Chrome version 80.0.3987.122 containing the recent zero-day flaw is available for download for Mac, Linux and Windows users.
Featured Image: Iansweeper
Don’t miss important articles during the week. Subscribe to cfamedia weekly newsletter for updates.