Government issues ‘high’ risk warning for users of this browser – Times of India

Government issues ‘high’ risk warning for users of this browser - Times of India

[ad_1]

The Indian Computer Emergency Response Team (CERT-In) under the IT ministry has issued a high severity warning for Microsoft Edge browser users. The warning is for the users who are using browser’s version prior to 98.0.1108.55. As per the warning, multiple vulnerabilities have been reported in Edge browser which could allow a remote attacker to execute arbitrary code, bypass security restrictions, execute arbitrary code or gain denial of service condition on the targeted system.
The advisory further reveals that “these vulnerabilities exist in Edge due to use after free in File Manager, heap buffer overflow in Tab Groups, use after free in Webstore API, use after free in ANGLE, use after free in GPU, integer overflow in Mojo, use after free in Animation, inappropriate implementation in Gamepad API.” Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security restrictions or cause denial of service condition on the targeted system.
What you can do to avoid any exploitation
To avoid any exploitation, the CERT-In wants Edge browser users to update to version 98.0.1108.55. The version was rolled out by the tech giant this week and it incorporates the latest Security Updates of the Chromium project. The update also contains a fix for CVE-2022-0609, which has been reported by the Chromium team as having an exploit in the wild.
The Edge version 98 comes with few improvements and new features. With the latest update, Microsoft has added Edge Bar. It is a floating widget that will male it easier for you to visit your favourite websites right from the desktop. By default, the Edge Bar is pinned on the right side of the screen.
With the verison, the company has also added Enhance Security Mode where browser security takes priority, giving users an extra layer of protection when browsing the web. Administrators can apply group policies to end-user desktops (Windows, macOS, and Linux) to help protect against in-the-wild exploits (also referred to 0-days).



[ad_2]

Source link

Leave a Comment

Your email address will not be published.