Time to update: Someone is attacking Google’s Chrome browser for desktop with a mysterious but serious vulnerability.
Google released an emergency patch to address the threat on Wednesday, warning that an “exploit” for the Chrome vulnerability exists in the wild.
The company classifies the flaw as “high” severity. But all other details are unknown, including the nature of the threat. That’s unusual since Google typically specifies the type of flaw it’s patching while withholding technical details to avoid tipping off hackers.
For now, the vulnerability is merely known as “466192044” since Google is still coordinating with cyber authorities on a CVE number to officially designate the threat. But because the vulnerability is being actively exploited, there’s a good chance a security researcher discovered the threat targeting real users and reported it to Google.
Despite the lack of official details, The Hacker News connected the “466192044” number to a bug ID for Google’s Chromium project, suggesting the flaw might relate to the company’s open-source Almost Native Graphics Layer Engine (ANGLE). That engine acts as a graphics command translator for different platforms with the project noting, “Chrome uses ANGLE for all graphics rendering on Windows.” The bug ID report on GitHub also suggests a buffer overflow vulnerability was found in the open-source project. Such flaws have been known to lead to program crashes and even executing malicious computer code.
Google didn’t immediately respond to a request for comment, making it unclear if the patched flaw is connected to ANGLE.
For now, the patch is available through Chrome version 143.0.7499.109/.110 for Windows and Mac. For Linux, the version number is 143.0.7499.109. Google says the fix is rolling out in the coming days and weeks, but we got it today.
Recommended by Our Editors
To update manually, go to Settings > About Chrome > Relaunch once the new version has finished loading, or visit Google’s support page on downloading patches. Chrome can also download the update automatically if you relaunch the browser.
Microsoft is also preparing a patch for the Edge browser, which uses Google’s Chromium browser project. “Microsoft is aware of the recent exploits existing in the wild. We are actively working on releasing a security fix,” the company said on Wednesday.
Get Our Best Stories!
Stay Safe With the Latest Security News and Updates
By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy
Policy.
Thanks for signing up!
Your subscription has been confirmed. Keep an eye on your inbox!
About Our Expert
Michael Kan
Senior Reporter
Experience
I’ve been a journalist for over 15 years. I got my start as a schools and cities reporter in Kansas City and joined PCMag in 2017, where I cover satellite internet services, cybersecurity, PC hardware, and more. I’m currently based in San Francisco, but previously spent over five years in China, covering the country’s technology sector.
Since 2020, I’ve covered the launch and explosive growth of SpaceX’s Starlink satellite internet service, writing 600+ stories on availability and feature launches, but also the regulatory battles over the expansion of satellite constellations, fights with rival providers like AST SpaceMobile and Amazon, and the effort to expand into satellite-based mobile service. I’ve combed through FCC filings for the latest news and driven to remote corners of California to test Starlink’s cellular service.
I also cover cyber threats, from ransomware gangs to the emergence of AI-based malware. Earlier this year, the FTC forced Avast to pay consumers $16.5 million for secretly harvesting and selling their personal information to third-party clients, as revealed in my joint investigation with Motherboard.
I also cover the PC graphics card market. Pandemic-era shortages led me to camp out in front of a Best Buy to get an RTX 3000. I’m now following how President Trump’s tariffs will affect the industry. I’m always eager to learn more, so please jump in the comments with feedback and send me tips.
Read Full Bio
