Google Fixes Actively Exploited CVE-2023-2136 Zero-Day Vulnerability in Chrome
The cyber-world is buzzing with news of the latest zero-day vulnerability, CVE-2023-2136, an integer overflow in Skia. With an exploit already making the rounds in the wild, it’s crucial for users and system administrators to understand the implications of this security flaw and take the necessary precautions.
The Discovery of CVE-2023-2136
Clément Lecigne of Google’s Threat Analysis Group first reported the CVE-2023-2136 vulnerability on April 12, 2023. This high-severity issue was discovered alongside four other critical security fixes in a recent update for Windows, Mac, and Linux platforms.
The Vulnerability: Integer Overflow in Skia
CVE-2023-2136 is an integer overflow vulnerability in Skia, a 2D graphics library commonly used in web browsers, operating systems, and other software applications. An integer overflow occurs when an arithmetic operation results in a value that exceeds the maximum limit of the integer type, causing the value to wrap around and become a much smaller or larger value than intended.
The Exploit in the Wild
It’s important to note that Google has acknowledged the existence of an exploit for CVE-2023-2136 in the wild. This means that threat actors have already begun using this vulnerability to target and compromise systems. The consequences of a successful exploit can vary, but they may include unauthorized access to sensitive information, data corruption, or even a complete system takeover.
Multi vulnerabilities were fixed
In addition to this zero-day, this update includes 7 other security fixes. Highlight flaws are the following:
- [$8000] High CVE-2023-2133: Out of bounds memory access in Service Worker API. Reported by Rong Jian of VRI on 2023-03-30
- [$8000] High CVE-2023-2134: Out of bounds memory access in Service Worker API. Reported by Rong Jian of VRI on 2023-03-30
- [$3000] High CVE-2023-2135: Use after free in DevTools. Reported by Cassidy Kim(@cassidy6564) on 2023-03-14
- [$1000] Medium CVE-2023-2137: Heap buffer overflow in sqlite. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research Institute on 2023-04-05
Mitigating the Threat
To address the CVE-2023-2136 vulnerability and other related security issues, the Stable and Extended Stable channels have been updated to version 112.0.5615.137/138 for Windows and 112.0.5615.137 for Mac. These updates will roll out over the coming days and weeks, with a Linux release expected soon.
Users and system administrators should take the following steps to protect their systems from this vulnerability:
- Update your software: Regularly check for and install updates to ensure you have the latest security patches. Keep an eye out for the specific releases mentioned above to address the CVE-2023-2136 vulnerability.
- Enable automatic updates: If possible, enable automatic updates on your devices to receive security fixes as soon as they become available.
- Monitor for signs of compromise: Regularly check system logs and security alerts for any suspicious activity that may indicate an exploit has occurred.
- Implement a layered security approach: Employing multiple layers of security, such as firewalls, intrusion detection systems, and antivirus software, can help minimize the risk of a successful exploit.