- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
What Happened?
Google’s Threat Analysis group reported a zero-day vulnerability (CVE-2022-0609) in Chrome that threat actors are currently exploiting in the wild. This is Chrome’s first zero-day of 2022.
This flaw is a high severity use-after-free vulnerability in the Animation component of Chrome. Not much else is currently known about the bug.
This vulnerability affects all Chrome users, regardless of which OS is running.
How Bad is This?
The complexity of this flaw is not fully known. However, the type of vulnerability and information disclosed by Google leads us to believe it can be triggered without much effort.
CISA (Cybersecurity Infrastructure and Security Agency) added the CVE to a catalog covered by its Binding Operational Directive, which means that the vulnerability carries a “significant risk to the federal enterprise”
What is a Use-After-Free (UAF) Exploit?
A use-after-free (UAF) exploit refers to memory after it has been freed, which can cause a program to use unexpected values, corrupt valid data, crash, or execute code, according to MITRE.
The root cause of UAF exploits can vary, although the two most common causes are exceptional circumstances such as error conditions, and confusion over which part of the program is responsible for freeing memory.
Google Chrome’s update on Monday addressed four other UAF flaws found in the browser’s Webstore API, File Manager, ANGLE, and GPU, according to Threatpost.
What Should I Do?
The latest Chrome update (Chrome 98.0.4758.102) addresses this issue in Windows, Mac and Linux, so users should patch Google Chrome immediately by navigating to the menu and selecting Help>About Google Chrome.
This new version of Chrome also patches seven other vulnerabilities — including one that received a High severity rating — so it’s important to update as soon as possible.
Administrators can turn on auto updates in Group Policy. In Group Policy, Windows administrators can navigate to Google>Google Update>Applications, and then enable the policy to Update Policy Override. Then, navigate to Options>Always Allow Updates.
Mac administrators can turn on auto updates via Google Workspace Managed Browsers, or through a mobile device management (MDM) console.
Try Blumira For Free
Blumira’s cloud SIEM detects and alerts you about suspicious behavior in your environment so that you can stop an incident early enough to prevent damage. Each finding we send is accompanied with a security playbook, giving you clear recommendations on how to remediate an attack. Our support team of security analysts is always available to answer questions on how to interpret a finding, or for other security help.
Blumira’s free trial is easy to deploy; IT and security teams can start seeing immediate security value for their organizations.
Mike Toole
Mike Toole, Head of Security and IT at Blumira, has over a decade of experience in IT. Prior to joining Blumira, he managed IT for Duo Security and Censys. He has broad experience with a range of IT and security focus areas, including compliance, network design, log monitoring, project management, and cross-platform...
More from the blog
View All Posts
Security Trends and Info
9 min read
| July 24, 2025
Critical Microsoft SharePoint Server vulnerability allows unauthorized code execution
Read More
Security Alerts
6 min read
| July 1, 2024
New Unauthenticated Remote Code Execution Flaw Identified in OpenSSH Server
Read More
Security Alerts
5 min read
| April 12, 2024
CVE-2024-3400: Palo Alto Vulnerabilities in GlobalProtect Gateway Lead to RCE
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.