The Computer Emergency Response Team of India or CERT-In has flagged several vulnerabilities in Google Chrome and Mozilla Firefox. According to the government agency, these vulnerabilities allow hackers to install malicious programs that can steal sensitive user data, bypass certain restrictions, perform small actions, and cause a denial of service or DoS attack.

CERT-in has flagged this vulnerability as a high severity issue, meaning that many systems are in grave danger.

As per a tweet from CERT-In’s official handle, the vulnerabilities are found in Google Chrome versions before 96.0.4664.209, whereas for Firefox, the vulnerable versions include Firefox iOS before 101, Thunderbird version before 91.10, Firefox ESR version before 91.10, and all desktop Firefox version 101.

According to CERT-In, these vulnerabilities can hand over the controls of your system to a malicious hacker, who can then create all sorts of problems for users.

While the hacker can easily steal sensitive data and bypass restrictions to execute a command on the victim’s system, it can also cause a denial of service or DoS attack.

For the unaware, a DoS attack occurs when users cannot access information systems, devices, or other resources on their system after getting hacked.

However, users do not need to be worried. Both Google and Mozilla quickly released patches and updates that address these vulnerabilities and fix all of these bugs. Users who want to protect themselves and their data stolen should immediately update their systems and software.

Google Chrome users can update to version 96.0.4664.209, while Mozilla users can upgrade to Mozilla Firefox iOS 101, Firefox Thunderbird 91.10, Firefox ESR 91.10, and Mozilla Firefox 101.

As a general rule, whenever any software company releases an update, a user should get that update as quickly as possible after going through the patch notes, which clarify precisely what the update is about. This is significantly more important if the company has pushed out a security update since they will likely take care of all the latest vulnerabilities and bugs.

Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

error: Unauthorized Content Copy Is Not Allowed
Scroll to Top
%d bloggers like this: