But we do know that this is now the fourth zero-day vulnerability to be patched this year. Information on the vulnerability has likely been withheld to prevent cybercriminals from learning too much about it. Also known as "heap smashing" or "heap overruns", this weakness in the wild can lead to harmful denial-of-service (DoS) attacks. This threat is associated with a heap overflow flaw within Chrome's Web Real-Time Communication (Web RTC) component, which gives the browser its real-time communications capabilities. The CVE-2022-2294 vulnerability has already been exploited by malicious parties and was only discovered when Jan Vojtesek from the Avast Threat Intelligence team reported the flaw on July 1st. The company merely posted a quick update on the Google Chrome Releases Blog. Granted it all depends on the full scenario, like if your a solo IT administrator and have to do everything yourself. Though the CVE-2022-2294 vulnerability is currently being exploited, Google is yet to release much information concerning how to detect it. Re: Google Chrome update via Intune (Endpoint) Well i guess that depends on what your target channel is.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |