Search
Close this search box.
Search
Close this search box.

Beware! 2.5 Billion Google Chrome Users are at Risk

Chrome Users Under Risk

Google Chrome is a web browser that is used by billions of people all over the world. Imperva Red, a cyber security company, found a security flaw in Google Chrome and Chromium-based browsers. This puts the data of more than 2.5 billion users at risk.

This flaw, which the company calls CVE-2022-3656, made it possible for sensitive files, like crypto wallets and cloud provider credentials, to be stolen.

Read More: Google Cloud AI Tools for Retailers

“The vulnerability was found through a review of how the browser interacts with the file system. Specifically, the review looked for common flaws in how browsers handle symlinks,” the blog says.

What is a Symlink?

A symbolic link, or symlink, is what Imperva Red calls a file that points to another file or directory. It tells the operating system that the linked file or directory should be treated as if it were at the location of the symlink. It says that a symlink can be used to make shortcuts, change the path to a file, or arrange files in a more flexible way.

But if these links are not handled properly, they can also be used to open security holes.

In the case of Google Chrome, the problem was caused by how the browser handled symlinks when it worked with files and directories. In particular, the browser didn’t check if the symlink pointing to a place that wasn’t meant to be accessible. This made it possible for sensitive files to be stolen, as explained in the blog post.

How Symlinks Affected Google Chrome?

The company says that an attacker could make a fake website that offers a new crypto wallet service. This is how the vulnerability affected Google Chrome. The website could then trick the user into making a new wallet by asking them to download their “recovery” keys.

Read Also: OpenAI Working on Paid Pro ChatGPT Version

These keys would actually be a zip file that contained a symlink to a private file or folder on the user’s computer, such as a cloud provider password. “When the user unzips and submits the “recovery” keys back to the website, the symlink is processed, and the attacker has access to the sensitive file,” the researchers write. blog says.

What should Chrome Users do?

Imperva Red says it told Google about the security hole, and the problem was fixed in Chrome 108. Users should always keep their software up to date to protect themselves from these kinds of weaknesses.


Subscribe to Our Newsletter

Related Articles

Top Trending

Christina Yamamoto
Christina Yamamoto: The Life and Legacy of Jhené Aiko's Mother
Rhea Ripley Husband Revealed
Rhea Ripley Husband Revealed: The Story of Her Journey With Buddy Matthews
Gaming Updates LCFModGeeks
Gaming Updates LCFModGeeks: Stay Ahead With Modded Software and Gamer Content
How Tall is Michael J Fox
How Tall is Michael J Fox? The Truth About His Height Revealed
Is Michael J. Fox a Christian
Is Michael J. Fox a Christian? Exploring the Actor's Views on Religion and Faith

LIFESTYLE

Clean Beauty Movement
How the Clean Beauty Movement Is Transforming Skincare in 2025
Gender Reveal Balloons
The Ultimate Guide to Gender Reveal Balloons: Colors, Styles, and Surprises
Best Places to Shop in Manchester
Shop 'Til You Drop: The Best Places to Shop in Manchester for Every Style
retirement cities in California
10 Best Retirement Cities in California for a Relaxed and Affordable Life
Mother's Day Around The World
Mother’s Day Traditions Around the World: Mother's Day 2025 Special

Entertainment

Christina Yamamoto
Christina Yamamoto: The Life and Legacy of Jhené Aiko's Mother
Rhea Ripley Husband Revealed
Rhea Ripley Husband Revealed: The Story of Her Journey With Buddy Matthews
Gaming Updates LCFModGeeks
Gaming Updates LCFModGeeks: Stay Ahead With Modded Software and Gamer Content
Netflix Saves Sesame Street After Trump Cuts PBS Funds
Sesame Street Finds New Home on Netflix After PBS Funding Cut
michael j fox net worth
Michael J. Fox's Net Worth: A Closer Look at His Earnings and Assets

GAMING

Gaming Updates LCFModGeeks
Gaming Updates LCFModGeeks: Stay Ahead With Modded Software and Gamer Content
Gaming Communities
2025 Gaming Communities: Powering Creativity, Commerce, and Connection
Gaming Options Beyond Traditional Video Games
4 Types of Gaming Options That Go Beyond Traditional Video Games
Apple Blocks Fortnite on iOS
Fortnite Blocked on iOS in 2025 as Epic-Apple War Escalates
Best Mobile Games for Commuting Without Internet
Best Mobile Games for Commuting Without Internet

BUSINESS

Zach Bryan Crypto
Zach Bryan Crypto: Exploring The Crypto.com Arena in Los Angeles With Zach Bryan on Instagram
regeneron buys 23andme biotech acquisition
Regeneron Acquires 23andMe for $256M Amid Bankruptcy Woes
BNB vs Bitcoin
BNB: What makes it different from Bitcoin? 
3D Animation Company
When to Choose a 3D Animation Company Over 2D
Capital One Completes $35B Discover Deal
Capital One Completes $35B Discover Deal, Becomes Card Giant

TECHNOLOGY

Microsoft to Host Elon Musk’s Grok AI
Microsoft to Host Elon Musk’s Grok AI on Its Cloud Platform
Xiaomi chip investment
Xiaomi to Invest $7B in Chips to Boost Tech Independence
automotive industry trends
6 Trends Changing the Automotive Industry Forever
3D Animation Company
When to Choose a 3D Animation Company Over 2D
API Integration Mistakes and How to Avoid Them
5 Common API Integration Mistakes and How to Avoid Them

HEALTH

Joe Biden Faces Aggressive Prostate Cancer
Joe Biden Faces Aggressive Prostate Cancer, Family Reviewing Care
Stroke Patient May Be Nearing the End of Life
Recognizing When a Stroke Patient May Be Nearing the End of Life
PSA Test
For Men: Is the PSA Test Still Necessary?
Cattle Joint Supplements
Top Cattle Joint Supplements: Boosting Your Herd’s Health and Performance
Molar Implant Healing Timeline
The Healing Timeline After Getting Molar Implants