Saturday, June 14, 2025
HomeChromeWarning! Google Chrome Zero-day Vulnerability Exploited in Wild

Warning! Google Chrome Zero-day Vulnerability Exploited in Wild

Published on

SIEM as a Service

Follow Us on Google News

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel.

The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the browser’s Visuals component that could allow an attacker to execute arbitrary code on a victim’s system.

Successful exploitation would give the attacker the same privileges as the logged-in user, potentially enabling them to install malware, steal data, or create new user accounts with full access.

- Advertisement - Google News

Join 400,000 Security professionals using the ANY RUN Malware Analysis sandbox: Sign up for free

According to the MS-ISAC advisory, the vulnerability was being exploited in the wild, making it a critical risk for unpatched systems.

Google acknowledged the existence of an exploit but did not provide further details to allow users time to apply the update.

High CVE-2024-4671: Use after free in Visuals. Reported by Anonymous on 2024-05-07

“Google is aware that an exploit for CVE-2024-4671 exists in the wild.”

The 124.0.6367.201 update is now available for users on the Stable channel, which is the main release branch recommended for most users after thorough testing.

The Extended Stable channel, which receives updates on a slower 8-week cycle, has also been updated to 124.0.6367.201.

Google credited an anonymous researcher with reporting the CVE-2024-4671 vulnerability. This release did not include any other security fixes.

According to Cyber Security News, this is Google’s sixth Chrome zero-day patch in 2024.

In April, Google fixed two other zero-day vulnerabilities, CVE-2024-2887 and CVE-2024-2886, that were exploited at the Pwn2Own Vancouver 2024 hacking competition

Users are strongly advised to update their Chrome installations as soon as possible to protect against potential attacks exploiting this critical vulnerability.

The update will roll out automatically over the coming days and weeks, but users can manually trigger the update by going to Chrome’s About menu.

Chrome is one of the world’s most widely used web browsers, making this vulnerability a significant security risk. Keeping software up-to-date with the latest security patches is crucial for protecting systems and data from emerging threats.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...