Tuesday, November 12, 2024
HomeChromeWarning! Google Chrome Zero-day Vulnerability Exploited in Wild

Warning! Google Chrome Zero-day Vulnerability Exploited in Wild

Published on

Malware protection

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel.

The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the browser’s Visuals component that could allow an attacker to execute arbitrary code on a victim’s system.

Successful exploitation would give the attacker the same privileges as the logged-in user, potentially enabling them to install malware, steal data, or create new user accounts with full access.

- Advertisement - SIEM as a Service

Join 400,000 Security professionals using the ANY RUN Malware Analysis sandbox: Sign up for free

According to the MS-ISAC advisory, the vulnerability was being exploited in the wild, making it a critical risk for unpatched systems.

Google acknowledged the existence of an exploit but did not provide further details to allow users time to apply the update.

High CVE-2024-4671: Use after free in Visuals. Reported by Anonymous on 2024-05-07

“Google is aware that an exploit for CVE-2024-4671 exists in the wild.”

The 124.0.6367.201 update is now available for users on the Stable channel, which is the main release branch recommended for most users after thorough testing.

The Extended Stable channel, which receives updates on a slower 8-week cycle, has also been updated to 124.0.6367.201.

Google credited an anonymous researcher with reporting the CVE-2024-4671 vulnerability. This release did not include any other security fixes.

According to Cyber Security News, this is Google’s sixth Chrome zero-day patch in 2024.

In April, Google fixed two other zero-day vulnerabilities, CVE-2024-2887 and CVE-2024-2886, that were exploited at the Pwn2Own Vancouver 2024 hacking competition

Users are strongly advised to update their Chrome installations as soon as possible to protect against potential attacks exploiting this critical vulnerability.

The update will roll out automatically over the coming days and weeks, but users can manually trigger the update by going to Chrome’s About menu.

Chrome is one of the world’s most widely used web browsers, making this vulnerability a significant security risk. Keeping software up-to-date with the latest security patches is crucial for protecting systems and data from emerging threats.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...