CERT-In Issues High Severity Alert on Google Chrome Vulnerability

CERT-In Issues High Severity Alert on Google Chrome Vulnerability

The Indian Computer Emergency Response Team (CERT-In) has issued a high severity alert concerning a newly discovered vulnerability in Google Chrome. This security flaw poses significant risks to user data and privacy by potentially allowing attackers to exploit affected systems.

Details of the Vulnerability

  • Affected Software: Specific versions of Google Chrome.
  • Mode of Exploitation: The vulnerability can be exploited if users visit a malicious website or open a compromised link.
  • Consequences: Exploitation of this vulnerability can lead to arbitrary code execution, granting attackers control over the affected system.

Response from Google

  • Acknowledgment: Google has acknowledged the issue.
  • Update Released: An update has been released to address the vulnerability.
  • Instructions to Update:
    • Navigate to the browser’s menu.
    • Select “Help.”
    • Choose “About Google Chrome.”
    • This will prompt the browser to check for updates and install them automatically.

Recommendations from CERT-In

  • Update Chrome: Users are strongly urged to update their Chrome browsers to the latest version immediately.
  • General Online Safety Measures:
    • Avoid clicking on unknown links.
    • Do not download files from untrusted sources.
    • Keep all software up-to-date.

Additional Information

For more detailed information on the vulnerability and updates, users can visit the official websites of CERT-In and Google Chrome.


Multiple Choice Questions (MCQs):

  1. What organization released a high severity alert regarding a vulnerability in Google Chrome?
    • a) Google
    • b) Indian Computer Emergency Response Team (CERT-In)
    • c) Microsoft
    • d) Mozilla Firefox
    Answer: b) Indian Computer Emergency Response Team (CERT-In)
  2. What could the newly discovered vulnerability in Google Chrome potentially allow attackers to do?
    • a) Increase browser speed
    • b) Change the browser’s appearance
    • c) Exploit affected systems and gain control
    • d) Reduce internet usage
    Answer: c) Exploit affected systems and gain control
  3. How can the vulnerability in Google Chrome be exploited?
    • a) By installing new software
    • b) By visiting a malicious website or opening a compromised link
    • c) By changing browser settings
    • d) By updating the browser
    Answer: b) By visiting a malicious website or opening a compromised link
  4. What has Google done in response to the vulnerability?
    • a) Ignored the issue
    • b) Released an update to address the vulnerability
    • c) Suggested users switch browsers
    • d) Closed down Google Chrome
    Answer: b) Released an update to address the vulnerability
  5. What general online safety measure is recommended by CERT-In?
    • a) Clicking on all links
    • b) Downloading files from any source
    • c) Keeping all software up-to-date
    • d) Ignoring software updates
    Answer: c) Keeping all software up-to-date