Google on Friday released an out-of-band update to resolve an actively exploited zero-day flaw in its Chrome web browser, making it the first bug to be addressed since the start of the year.
“Type obfuscation in V8 on Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit stack corruption via generated HTML pages,” according to to the National Vulnerability Database (NVD) NIST.
Tech giant acknowledged that “an exploit for CVE-2023-2033 exists in the wild”, but stopped short of sharing additional technical specifications or compromise indicators (IoC) to prevent further exploitation by threat actors.
CVE-2023-2033 also appears to share similarities with CVE-2022-1096, CVE-2022-1364, CVE-2022-3723, and CVE-2022-4262 – four actively abused type confusion flaws in V8 that were fixed by Google in year 2022.
Google closed a total of nine days zero in Chrome last year. The development comes days after Citizen Lab and Microsoft disclosed an exploit of a now-patched vulnerability in Apple iOS by a customer of a shadowy spyware vendor named QuaDream to target journalists, political opposition figures and NGO workers in 2021.
Users are advised to upgrade to version 112.0.5615.121 for Windows, macOS, and Linux to mitigate potential threats. Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera and Vivaldi are also advised to apply the fix when it becomes available.