Skip to main content

6 new Google Chrome flaws allow remote phone hacking | | Update Chrome or use BRAVE Browser

Cybersecurity experts have revealed the discovery of six security issues in Google Chrome, one of the world's most popular Internet browsers. Successful exploitation of these traits can create many vicious situations.
100+ Free Mobile Security & Smart Home Images - Pixabay

Below is a brief description of the reported vulnerabilities, in addition to their scores and tracking keys according to the Common Vulnerability Scoring System (CVSS).

CVE-2020-6493: This is a back-end risk that exists due to an error in the Google Chrome Web authentication feature.
 A threatening actor can redirect victims to a malicious website to help them become vulnerable and create a code of opposition to the program.

This error scored 7.7/10, so it is considered a serious difficulty.


CVE-2020-6494: This risk exists due to insufficient confirmation of user inclusion in the Google Chrome payment item. Threatening actors can create a specially designed website, trick the victim into visiting it and lying about its contents.

This is a very serious mistake, as it scored 7.1 / 10 on the CVSS rating.


CVE-2020-6495: This error exists due to inadequate policy implementation of developer tools in Chrome.
A remote giant can redirect victims to websites with malicious content in order to bypass security measures and compromise the affected system.

The error scored 7.7 / 10, so it is considered very serious.




CVE-2020-6496: This error exists due to a usage error after the payment component in Google Chrome.
A remote attacker can create a specially designed webpage, trick the victim into visiting it, create a free-use bug and create an anti-target code.

This error also scored 7.7 / 10 points, so it is considered a high gravity error.


CVE-2020-6497: This risk exists due to the enforcement of Omnibox policy in Google Chrome and allows attackers to bypass security systems in the system.
 Hackers can trick a victim into visiting a specially designed website, bypassing security measures and gaining access to sensitive information.

This is a medium-sized risk and a score of 4.7 / 10 on the CVSS scale.


CVE-2020-6498: This error exists due to insufficient verification of user-provided development features shown in Google Chrome.
 A remote attacker can create a specially designed website, trick the victim into visiting it, and fake the content of the website.

Error scored 4.7 / 10 on the CVSS scale, so it is considered a medium size error.






Although errors can be used remotely by unverified hackers, there is no point in starting this attack. Google has already released compatible updates, so users should only confirm the installation.


Comments

Popular posts from this blog

Netwalker Goes After College of Nurses' Data in Ontario

T he cybercrime Netwalker team is guilty of extracting information from the Ontario Nursing College on ransomware attacks. A screenshot of information allegedly removed by the school has been posted on the Netwalker site, where the name of the school has been added to the number of injured people in the group. In a heated statement released yesterday, the school saw that it was affected by network security but did not indicate what had happened. The proclamation reads: "The College of the Nurses of Ontario (CNO) is currently pursuing normal operations following a network security incident. With the never-ending release of this episode on September 8, CNO found a way to prevent this incident and took over network protection. in a far-reaching legal examination. " As a result of this episode, the various administrations provided by the CNO are not easily accessible, including the public Register Find a Nurse, the Nursing Rehabilitation Center and the entrance gate. The CNO sai...

LIVE Webinar on Zerologon Vulnerability Is Going To Take Place: Technical Analysis and Detection

  I'm sure most of you have now heard of a high-risk Windows server - called Zerologon - that would allow hackers to take over business networks completely. For those of you who don't know, in short, all supported versions of Windows Server applications are at risk of a serious patent infringement that resides in the Netlogon Remote Control Protocol for Domain Controllers. In other words, the primary vulnerability (CVE-2020-1472) can be exploited by the attacker to stop Active Directory services, and ultimately, the Windows domain without the need for authentication. What’s worse is that the exploitation of evidence of this error was released to the public last week, and soon after that, the attackers began exploiting vulnerabilities through programs that were not included in the wild. As explained in our compilation based on technical analysis published by Cynet's security analysts, the main problem is Microsoft's implementation of AES-CFB8, where it failed to use the ...