Google Chrome has started blocking seven more TCP ports to enhance security. Specifically, the objective is to secure the user against the NAT Slipstreaming 2.0 vulnerability. The popular internet browser is therefore against one of the most recent problems that can jeopardize security and personal privacy when browsing the web.
Chrome blocks seven more ports
Google’s web browser has proven that it takes user security very seriously. We have seen on other events how they launch patches and improvements to cover particular vulnerabilities that might affect. Remember that it is one of the most utilized web browser, so any failure can impact numerous users.
We recently saw a new attack called NAT Slipstreaming 2.0 It is a new variation that can jeopardize internal networks. It essentially includes enticing a user to check out a destructive website and hence bypassing browser-based port limitations. This could permit an assailant to remotely access TCP/ UDP services on the computer system of the victim they have assaulted. You can even bypass a firewall or NAT security.
This has actually triggered Google Chrome to come down to work to attempt to decrease the effect of this brand-new vulnerability. That has caused it to obstruct a total of seven more ports than those that were already obstructed.
Now blocks access by means of HTTP, HTTPS, and FTP to TCP ports 69, 137, 161, 1719, 1720, 1723, and6566 From Chrome they suggest that these ports are known to be inspected by NAT devices and can be exploited.
If a user tried to connect to a website utilizing any of these ports, Google Chrome would display a message mentioning that the website can not be accessed and displays an ” ERR_UNSAFE_PORT” mistake.
This indicates that a websites that is hosted in one of those ports ought to be altered to a different port. In this method, problems would be avoided and users might access that site normally.
Other internet browsers likewise add mitigations
It must be kept in mind that the case of Google Chrome is not unique. Other important web browsers such as Mozilla Firefox, Edge or Safari have also consisted of some changes to try to prevent this issue that might compromise the security of users.
In Edge’s case it could have blocked the very same ports as Chrome. It is unidentified which would have blocked the other 2 browsers. However, in all these cases they have sought to safeguard themselves from the NAT Slipstreaming 2.0 vulnerability.
As we constantly state, it is important to have the most current variations at all times. We are not only discussing the web browser, as is this case we discussed, but likewise about the operating system that we are using or any other program. We need to have the spots offered at all times and be secured from possible vulnerabilities that can be exploited by hackers.
We leave you an article where we talk about how to pick the most secure browser. Some elements that we can take into consideration.