{"id":112538,"date":"2025-05-18T20:07:07","date_gmt":"2025-05-18T20:07:07","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/112538\/"},"modified":"2025-05-18T20:07:07","modified_gmt":"2025-05-18T20:07:07","slug":"google-chrome-deadline-21-days-to-update-or-stop-using-browser","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/112538\/","title":{"rendered":"Google Chrome Deadline\u201421 Days To Update Or Stop Using Browser"},"content":{"rendered":"<p class=\"color-body light-text\" role=\"button\">Update nbow warning for 2 billion Chrome users<\/p>\n<p>NurPhoto via Getty Images<\/p>\n<p>Republished on May 18 with update now deployed to most users and warnings on the critical step all users must take to make sure their browsers are secure.<\/p>\n<p>Google has warned that Chrome is open to attack, and has rushed out a fix for a vulnerability that enables a hacker to steal login credentials and bypass multi-factor authentication. It\u2019s a critical issue, and it\u2019s imperative it\u2019s fixed immediately. The U.S. government has now mandated all federal staff to update by June 5. Whether you\u2019re a home or enterprise user, you should do the same.<\/p>\n<p>America\u2019s cyber defense agency has told all federal agency staff to \u201capply mitigations per vendor instructions\u2026 or discontinue use of the product if mitigations are unavailable.\u201d That means update inside the next 21 days or stop using your browser until you do.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-5\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/17\/google-is-deleting-all-your-location-data-do-not-miss-deadline\/\" target=\"_blank\" aria-label=\"Google Is Deleting All Your Location Data\u2014Do Not Miss Deadline\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/17\/google-is-deleting-all-your-location-data-do-not-miss-deadline\/\">ForbesGoogle Is Deleting All Your Location Data\u2014Do Not Miss DeadlineBy Zak Doffman<\/a><\/p>\n<p><a class=\"color-link\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" aria-label=\"CISA\u2019s\">CISA\u2019s<\/a> formal mandate only applies to federal employees, but its remit extends to all organizations, \u201cto help [them]<\/p>\n<p> better manage vulnerabilities and keep pace with threat activity.\u201d Given the nature of this threat, users should act now. CISA issues plenty of such mandates, but given Chrome\u2019s install base and that this threat is now in the public domain, it really is critical for you to follow suit.<\/p>\n<p>Although the binding operational directive only applies to federal staff, CISA \u201cstrongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of\u202fCatalog vulnerabilities\u202fas part of their vulnerability management.\u201d<\/p>\n<p>As I warned yesterday, <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/15\/google-issues-chrome-attack-warning-check-your-browser-now\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/15\/google-issues-chrome-attack-warning-check-your-browser-now\/\" target=\"_self\" aria-label=\"Google\u2019s fix for CVE-2025-4664\" rel=\"noopener\">Google\u2019s fix for CVE-2025-4664<\/a> came with a <a class=\"color-link\" href=\"https:\/\/chromereleases.googleblog.com\/search\/label\/Desktop%20Update\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/chromereleases.googleblog.com\/search\/label\/Desktop%20Update\" aria-label=\"warning\">warning<\/a> \u201cof reports that an exploit exists in the wild.\u201d This was flagged on X by <a class=\"color-link\" href=\"https:\/\/x.com\/slonser_\/status\/1919439373986107814?s=61&amp;t=hwS5xcISslT5UvqlKf-9Wg\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/x.com\/slonser_\/status\/1919439373986107814?s=61&amp;t=hwS5xcISslT5UvqlKf-9Wg\" aria-label=\"@slonser_\">@slonser_<\/a>, after discovering that \u201ca technique that\u2019s probably not widely known in the community\u201d enabled a query parameter takeover that could exploit sensitive data included in the string. \u201cIn OAuth flows, this might lead to an Account Takeover\u201d if that query parameter is stolen.<\/p>\n<p>This means stealing the text string from Chrome that includes security session credentials after you\u2019ve logged into a service. It enables an attacker to replicate the secure session on their own device.<\/p>\n<p>Per <a class=\"color-link\" href=\"https:\/\/www.scworld.com\/news\/google-chrome-bug-that-could-leak-sensitive-info-actively-exploited\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.scworld.com\/news\/google-chrome-bug-that-could-leak-sensitive-info-actively-exploited\" aria-label=\"SC Media\">SC Media<\/a>, \u201cits inclusion in the KEV catalog indicates the attackers have attempted to misuse the flaw in the wild.\u201d But it\u2019s unclear whether the flagged exploit is the POC raised or there are actual attacks underway with bad actors having identified the vulnerability independently. It doesn\u2019t matter now. This is in the public domain. We\u2019re now in the period of maximum risk as attackers strike before browsers are patched.\u201d<\/p>\n<p><a class=\"color-link\" href=\"https:\/\/cybersecuritynews.com\/cisa-warns-of-google-chromium-vulnerability-actively-exploited-in-the-wild\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/cybersecuritynews.com\/cisa-warns-of-google-chromium-vulnerability-actively-exploited-in-the-wild\/\" aria-label=\"Cybersecurity News\">Cybersecurity News<\/a> warns \u201cthe vulnerability stems from an incorrect handle provided under unspecified circumstances in Chrome\u2019s Mojo Inter-Process Communication (IPC) layer, potentially leading to unauthorized code execution or sandbox escape. The vulnerability poses significant risks, including unauthorized data leakage across web origins\u2026 Given its classification as a zero-day flaw, it was exploited before Google released the patch, heightening the urgency for mitigation.\u201d<\/p>\n<p>Check your Chrome browser for the notification <a class=\"color-link\" href=\"https:\/\/support.google.com\/chrome\/answer\/95414?hl=en-GB&amp;co=GENIE.Platform%3DDesktop\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/support.google.com\/chrome\/answer\/95414?hl=en-GB&amp;co=GENIE.Platform%3DDesktop\" aria-label=\"an update has been downloaded\">an update has been downloaded<\/a> and you need to relaunch to ensure it installs. You\u2019re looking for Chrome version 136.0.7103.113\/.114. Do this as soon as you can \u2014 don\u2019t let dozens of open tabs hold you back. With this vulnerability, it is imperative to patch now.<\/p>\n<p>The same update warning also applies to Microsoft Edge. \u201cThis CVE was assigned by Chrome,\u201d <a class=\"color-link\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-4664\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-4664\" aria-label=\"the Windows-maker has confirmed\">the Windows-maker has confirmed<\/a>, but given \u201cMicrosoft Edge (Chromium-based) ingests Chromium,\u201d that fix also \u201caddresses this vulnerability.\u201d<\/p>\n<p>There\u2019s a good explainer on this vulnerability now available courtesy of <a class=\"color-link\" href=\"https:\/\/medium.com\/@Cyber-AppSec\/chromes-cve-2025-4664-how-a-single-header-could-leak-sensitive-data-11449d0345c8\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/medium.com\/@Cyber-AppSec\/chromes-cve-2025-4664-how-a-single-header-could-leak-sensitive-data-11449d0345c8\" aria-label=\"Cyber-AppSec\">Cyber-AppSec<\/a> on Medium. \u201cThis flaw affects Chrome\u2019s Loader component and could allow attackers to steal sensitive data from other websites \u2014 all through a crafty little trick involving the Link header.\u201d While \u201cmost browsers don\u2019t pay much attention to Link headers on these kinds of requests,\u201d Chrome does, which enables the attacker to trick the browser into sending your session security info included in a full URL to their own server.<\/p>\n<p>That attack is now in the public domain. While Google\u2019s warning advised this urgent update \u201cwill roll out over the coming days\/weeks,\u201d it should be available to you now \u2014 most users have it. It\u2019s not surprising it has been deployed quickly, given the short space of time between the public disclosure and the update, and CISA\u2019s update mandate. But automatically downloading the software is not enough. As the Chrome ecosystem is being warned (<a class=\"color-link\" href=\"https:\/\/www.thesun.co.uk\/tech\/35004019\/alert-google-chrome-users-to-relaunch-browsers\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.thesun.co.uk\/tech\/35004019\/alert-google-chrome-users-to-relaunch-browsers\/\" aria-label=\"1\">1<\/a>,<a class=\"color-link\" href=\"https:\/\/www.express.co.uk\/life-style\/science-technology\/2056048\/Google-Chrome-browser-update-bug-fix\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.express.co.uk\/life-style\/science-technology\/2056048\/Google-Chrome-browser-update-bug-fix\" aria-label=\"2\">2<\/a>), \u201call Chrome users must &#8216;relaunch\u2019 their browser now.&#8221;<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-4\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/16\/hacking-disaster-warning-delete-all-these-emails-on-your-pc\/\" target=\"_blank\" aria-label=\"Hacking Disaster Warning\u2014Delete All These Emails On Your PC\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/16\/hacking-disaster-warning-delete-all-these-emails-on-your-pc\/\">ForbesHacking Disaster Warning\u2014Delete All These Emails On Your PCBy Zak Doffman<\/a><\/p>\n<p>Why the need to relaunch? As Google explains, \u201cnormally updates happen in the background when you close and reopen your computer\u2019s browser. But if you haven\u2019t closed your browser in a while, you might see a pending update.<\/p>\n<p>While Chrome \u201csaves your opened tabs and windows and reopens them automatically when it restarts,\u201d that\u2019s not the case for Incognito tabs which \u201cwon\u2019t reopen when Chrome restarts.\u201d Google says \u201cif you don\u2019t want to restart straight away, select Not now,\u201d which means &#8220;the update applies the next time that you restart Chrome. But given this is a fix for an active attack, that\u2019s not recommended this time around.<\/p>\n","protected":false},"excerpt":{"rendered":"Update nbow warning for 2 billion Chrome users NurPhoto via Getty Images Republished on May 18 with update&hellip;\n","protected":false},"author":2,"featured_media":112539,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[51020,51018,51019,24778,1963,53,16,15,1962],"class_list":{"0":"post-112538","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-change-your-browser","9":"tag-chrome-attack","10":"tag-cisa-warning","11":"tag-google-attack","12":"tag-microsoft-warning","13":"tag-technology","14":"tag-uk","15":"tag-united-kingdom","16":"tag-windows-warning"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114530644491105189","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/112538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=112538"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/112538\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/112539"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=112538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=112538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=112538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}