* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [SASE](https://origin-researchcenter.paloaltonetworks.com/blog/sase/) * [Product Features](https://origin-researchcenter.paloaltonetworks.com/blog/sase/category/product-features/) * Use RBI as Your Edge Over... # Use RBI as Your Edge Over Zero-Day Browser Vulnerabilities [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fsase%2Fuse-rbi-as-your-edge-over-zero-day-browser-vulnerabilities%2F) [](https://twitter.com/share?text=Use+RBI+as+Your+Edge+Over+Zero-Day+Browser+Vulnerabilities&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fsase%2Fuse-rbi-as-your-edge-over-zero-day-browser-vulnerabilities%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fsase%2Fuse-rbi-as-your-edge-over-zero-day-browser-vulnerabilities%2F&title=Use+RBI+as+Your+Edge+Over+Zero-Day+Browser+Vulnerabilities&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/sase/use-rbi-as-your-edge-over-zero-day-browser-vulnerabilities/&ts=markdown) \[\](mailto:?subject=Use RBI as Your Edge Over Zero-Day Browser Vulnerabilities) Link copied By [Nitish Khadke](https://www.paloaltonetworks.com/blog/author/nitish-khadke/?ts=markdown "Posts by Nitish Khadke") and [Sapan Goel](https://www.paloaltonetworks.com/blog/author/sapan-goel/?ts=markdown "Posts by Sapan Goel") Apr 02, 2024 5 minutes [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [Prisma Access](https://www.paloaltonetworks.com/blog/tag/prisma-access/?ts=markdown) [RBI](https://www.paloaltonetworks.com/blog/tag/rbi/?ts=markdown) [Zero Day Vulnerability](https://www.paloaltonetworks.com/blog/tag/zero-day-vulnerability/?ts=markdown) In the current world with employees working from anywhere and most business applications delivered via internet-hosted web applications, web browsers have become an employee's digital workspace. For better or worse, web browsers collect tons of sensitive information---including passwords stored in password managers, credit card data, and personal information. This information is valuable for hackers to sell, extort, or use to gain access to other systems. In addition to all the data collected, vendors frequently update consumer browsers with new features. For example, [Google released 12 updates to Chrome in 2023](https://support.google.com/chrome/a/answer/10314655?hl=en), while [Microsoft released 12 Microsoft Edge updates](https://learn.microsoft.com/en-us/deployedge/microsoft-edge-release-schedule) in the same year. This high velocity of code churn can add vulnerabilities that attackers could exploit. A total of [296 vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-15031/Google-Chrome.html?page=1&year=2023&month=-1&order=1&trc=296&sha=400ee16307fd6e142c157af557dffa4f387b6169)) were reported in Google Chrome in 2023. During the same period, [six vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-32367/Microsoft-Edge.html?page=1&year=2023&month=-1&order=1&trc=0&sha=963cdd09210adf3f855e2d64723da49480b0a428) were reported in Microsoft Edge and [41 vulnerabilities](https://www.cvedetails.com/vulnerability-list/vendor_id-49/product_id-2935/Apple-Safari.html?page=1&year=2023&month=-1&order=1&trc=1424&sha=10528c1c673f88d1c71b3bacdfaf28fb1269bd8b) in Apple Safari. Many of these vulnerabilities will persist until threat actors exploit them or someone reports them. As long as these vulnerabilities remain undiscovered, they are always available for exploitation. Even with regular browser updates, end users will always be exposed to unknown or zero-day vulnerabilities. In 2023, Google fixed eight zero-day vulnerabilities: * CVE-2023-2033: Type confusion in V8 * CVE-2023-2136: Integer overflow in Skia * CVE-2023-3079: Type confusion in V8 * CVE-2023-4762: Type confusion in V8 * CVE-2023-4863: Heap buffer overflow in WebP * CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx * CVE-2023-6345: Integer overflow in Skia * CVE-2023-7024: Heap buffer overflow in WebRTC Let's take an example of the latest zero-day vulnerability, [CVE-2023-7024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7024). This high-severity heap buffer overflow in the WebRTC component could enable a remote attacker to escape the sandbox and execute arbitrary code on the host system. Once hackers get remote access to the Chrome browser, they can see the user's browsing history, most visited sites, and login credentials, among others. Furthermore, malicious extensions can download malware to establish a backdoor to maintain persistence or redirect traffic to an exploit server. There are multiple ways that hackers can exploit browser vulnerabilities. The following are just some examples: 1. **Drive-by downloads.** Simply loading a webpage initiates the download of a malicious payload. End users don't have to click on anything, press download, or open a malicious email attachment to become infected. Drive-by downloads usually take advantage of an unpatched vulnerability in the browser. 2. **Exploit kits targeting browsers.** Hackers can send phishing emails with exploit kits. A person clicks on a link in a phishing email, which opens a malicious page in their browser, which can then exploit an unpatched vulnerability in the browser. Take an example of the Magnitude exploit kit that targeted[CVE-2021-21224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21224),[and CVE-2021-31956](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31956) in the browser to escape the Chromium sandbox. 3. \*\*Meddler-in-the-browser.\*\*This is a form of a meddler-in-the-middle attack where attackers compromise a web browser by inserting themselves into the communications channel between two trusting parties. Adversaries can take advantage of security gaps or manipulate inherent browser functionality to change content, modify behavior, and intercept information. The Palo Alto Networks browser-based product offerings reduce your organization's risk from browser-native attacks. [Prisma Access Browser](https://www.paloaltonetworks.com/sase/prisma-access-browser) has unique security hardening and controls, and [Remote Browser Isolation (RBI) for Prisma Access](https://www.paloaltonetworks.com/sase/remote-browser-isolation) can help completely protect you from zero-day browser vulnerabilities. ## Three Ways RBI for Prisma Access Minimizes Zero-Day Browser Vulnerability Impact ### **1. Keep the browser up to date.** We continually update our [RBI for Prisma Access](https://www.paloaltonetworks.com/blog/sase/palo-alto-networks-natively-integrates-remote-browser-isolation-rbi-with-sase/) production browser to ensure there is a minimal gap between it and the latest available Chromium build. Our production browser is often an advanced and more secure build than the browser many employees use at any given point in time. ### 2. Sanitize the browser environment. Malicious actors often exploit plugins and browser extensions to execute vulnerabilities like the ones described above. Bad actors use plugins and browser extensions to deliver malware to the end user and even skim and steal data that the user enters on webpages, without their knowledge. We keep our[RBI for Prisma Access](https://www.paloaltonetworks.com/resources/datasheets/remote-browser-isolation) production browser environment sanitized by not allowing the installation of any third-party extensions or plugins. We even prevent extensions and plugins running on local browsers from accessing or interacting with the isolated webpage when an employee uses RBI for Prisma Access. ### 3. Provide a true no-code execution environment. An isolated browser session mitigates even unidentified vulnerabilities. RBI for Prisma Access operates under the Zero Trust principle that unknown websites contain dangerous content and need to run in a containerized and isolated cloud environment. That way, no code ever reaches the end user's browser, preventing security incidents and data breaches that could originate from drive-by downloads, phishing-based exploit kits, and meddler-in-the-browser attacks, among other threats. ## RBI for Prisma Access Web browsers have become the most important business applications to access the internet and business-critical web applications. However, zero-day vulnerabilities in web browsers continue to pose significant risks from threat actors who can execute remote code, steal data, or crash systems. Find out how [RBI for Prisma Access](https://www.paloaltonetworks.com/resources/videos/remote-browser-isolation) seamlessly embeds Zero Trust web isolation to protect against these attacks, while simultaneously providing a near-native web browsing experience. *** ** * ** *** ## Related Blogs ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Maximize Zero-Day Protection with Dynamic RBI \& Prisma SASE](https://origin-researchcenter.paloaltonetworks.com/blog/sase/maximize-zero-day-protection-dynamic-rbi-prisma-sase/) ### [Mobile Users](https://www.paloaltonetworks.com/blog/sase/category/mobile-users/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Improve Microsoft Teams Meeting Performance with ADEM](https://origin-researchcenter.paloaltonetworks.com/blog/sase/improve-microsoft-teams-meeting-performance-with-adem/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Revolutionize User Experiences with App Acceleration](https://origin-researchcenter.paloaltonetworks.com/blog/sase/revolutionize-user-experiences-reduce-packet-loss-app-acceleration/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Prisma Access \& Data Privacy: A Solution for Works Councils](https://origin-researchcenter.paloaltonetworks.com/blog/sase/prisma-access-data-privacy-a-solution-for-works-councils/) ### [Cloud-delivered Security](https://www.paloaltonetworks.com/blog/sase/category/cloud-delivered-security/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Palo Alto Networks Natively Integrates RBI with SASE](https://origin-researchcenter.paloaltonetworks.com/blog/sase/palo-alto-networks-natively-integrates-remote-browser-isolation-rbi-with-sase/) ### [Cloud-delivered Security](https://www.paloaltonetworks.com/blog/sase/category/cloud-delivered-security/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Remote Workforce](https://www.paloaltonetworks.com/blog/category/remote-workforce/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown), [Web Security](https://www.paloaltonetworks.com/blog/category/web-security/?ts=markdown) [#### Unleashing the Benefits of Cloud SWG with Agent-Based Proxy](https://origin-researchcenter.paloaltonetworks.com/blog/sase/unleashing-the-benefits-of-cloud-swg-with-agent-based-proxy/) ### Subscribe to Sase Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language