<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Google Chrome 131.0.6778.109 Error 1603 (googlechromestandaloneenterprise.msi)]]></title><description><![CDATA[<p dir="auto">During testing of the Google Chrome 131.0.6778.109 MSI package, we found that it was broken, resulting in Exit Code 1603 after attempting to spawn a UAC prompt as the SYSTEM user.</p>
<p dir="auto">This issue occurs both when upgrading via VulnDetect and Intune. In some cases, it even breaks the existing installation during rollback of the failed update.</p>
<p dir="auto">As a result, we pulled the update before releasing it to customers.</p>
<p dir="auto">Once Google has fixed the Enterprise "ready" MSI installer, we will update the package and make it available after thorough testing.</p>
<p dir="auto">Please "upvote" the following post by Mikhail Gurin if you are affected by this and have a Google account. Hopefully, this will help make Google prioritize the fix: <a href="https://support.google.com/chrome/thread/311347547" rel="nofollow ugc">https://support.google.com/chrome/thread/311347547</a></p>
<p dir="auto">For reference, we use the following installers:</p>
<pre><code>https://dl.google.com/tag/s/dl/chrome/install/googlechromestandaloneenterprise.msi
https://dl.google.com/tag/s/dl/chrome/install/googlechromestandaloneenterprise64.msi
</code></pre>
<p dir="auto">We also tested the EXE-based installers for offline deployment but found that these are incompatible with MSI-based installations.</p>
<p dir="auto">It should be noted that the MSI works if launched interactively as a regular user who can approve the UAC prompt.</p>
]]></description><link>https://vulndetect.org/topic/2698/google-chrome-131-0-6778-109-error-1603-googlechromestandaloneenterprise-msi</link><generator>RSS for Node</generator><lastBuildDate>Fri, 06 Mar 2026 15:34:59 GMT</lastBuildDate><atom:link href="https://vulndetect.org/topic/2698.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 05 Dec 2024 14:13:26 GMT</pubDate><ttl>60</ttl></channel></rss>