Saturday, November 16, 2024
HomeCVE/vulnerabilityUnpatched zero-day vulnerability Affecting Current Versions of Google Chrome & Microsoft Edge...

Unpatched zero-day vulnerability Affecting Current Versions of Google Chrome & Microsoft Edge Published Online

Published on

In a daily investigating routine, a security researcher, Rajvardhan Agarwal from India has noted a new zero-day vulnerability code execution affecting major web browsers.

According to the report, this new zero-day vulnerability is affecting the very new version of Google Chrome, Microsoft Edge, and other Chromium-powered browsers like Opera and Brave.  

Rajvardhan noted that this new zero-day flaw has been affecting many tech giants for a long time, and this PoC exploit was actually developed for a vulnerability exploited in the Pwn2Own hacking competition.

- Advertisement - SIEM as a Service

Unpatched zero-day vulnerability

After knowing regarding the vulnerability, Rajvardhan Agarwal immediately published a working proof-of-concept for all the remote code execution. The new PoC was initially released for the V8 JavaScript engine that is present in the Chromium-based browser.

After launching the new PoC for remote code execution, the security analyst Rajvardhan described the PoC HTML file. The analyst remarked that when the files are loaded in Chromium-based browsers, it will eventually exploit the vulnerability.

Once the vulnerability gets launched, it starts launching the Windows calculator program. However, the most important part of the PoC release is that the zero-day vulnerability of Agarwal’s is not escaping the browser’s sandbox.

According to the security researcher, Rajvardhan Agarwal,  the Chrome sandbox is the browser security that plays the role of boundary, and help the sandbox to protect them from all kind of remote code execution vulnerability.

Not only this, but the experts also affirmed that the browser security launch different programs on the host computer so that it will ensure its protection from the vulnerabilities.

The Zero-day that is launched by Agarwal needs to be chained with some other vulnerability so that it can enable all kinds of exploits to evade the Chromium sandbox.

Along with the disabled sandbox, Agarwal’s exploit can be used together to launch the calculator on Windows 10; not only this but the experts also declared that all the procedures are to be maintained properly so that it can execute its job correctly.

After performing the test, the specialists easily exploited the latest versions that are Google Chrome 89.0.4389.114 and Microsoft Edge 89.0.774.76.

Now Google will launch its Chrome 90, a new version to stable the conflicts that are being faced by the users and the company. Once the new version is released, everyone can see that if the new version contains any fix for this zero-day RCE vulnerability.

Moreover, researchers believe that Agarwal’s PoC release had helped them very much, and now they are trying their best to patch the flaw.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access

CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for...

4M+ WordPress Websites to Attacks, Following Plugin Vulnerability

A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin,...