Warning! Google Chrome Zero-day Vulnerability Exploited in Wild

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel.

The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the browser’s Visuals component that could allow an attacker to execute arbitrary code on a victim’s system.

Successful exploitation would give the attacker the same privileges as the logged-in user, potentially enabling them to install malware, steal data, or create new user accounts with full access.

Join 400,000 Security professionals using the ANY RUN Malware Analysis sandbox: Sign up for free

According to the MS-ISAC advisory, the vulnerability was being exploited in the wild, making it a critical risk for unpatched systems.

Google acknowledged the existence of an exploit but did not provide further details to allow users time to apply the update.

High CVE-2024-4671: Use after free in Visuals. Reported by Anonymous on 2024-05-07

“Google is aware that an exploit for CVE-2024-4671 exists in the wild.”

The 124.0.6367.201 update is now available for users on the Stable channel, which is the main release branch recommended for most users after thorough testing.

The Extended Stable channel, which receives updates on a slower 8-week cycle, has also been updated to 124.0.6367.201.

Google credited an anonymous researcher with reporting the CVE-2024-4671 vulnerability. This release did not include any other security fixes.

According to Cyber Security News, this is Google’s sixth Chrome zero-day patch in 2024.

In April, Google fixed two other zero-day vulnerabilities, CVE-2024-2887 and CVE-2024-2886, that were exploited at the Pwn2Own Vancouver 2024 hacking competition

Users are strongly advised to update their Chrome installations as soon as possible to protect against potential attacks exploiting this critical vulnerability.

The update will roll out automatically over the coming days and weeks, but users can manually trigger the update by going to Chrome’s About menu.

Chrome is one of the world’s most widely used web browsers, making this vulnerability a significant security risk. Keeping software up-to-date with the latest security patches is crucial for protecting systems and data from emerging threats.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Poseidon Stealer Targets Mac Users via Fake DeepSeek Website

Cybersecurity researchers uncovered a sophisticated malware campaign targeting macOS users through a fraudulent DeepSeek.ai interface.…

12 minutes ago

Beware of Fake Job Interview Challenges Targeting Developers to Deliver Malware

A new wave of cyberattacks, dubbed "DeceptiveDevelopment," has been targeting freelance developers through fake job…

1 hour ago

New Phishing Attack Targets Amazon Prime Users to Steal Login Credentials

A new phishing campaign targeting Amazon Prime users has been identified, aiming to steal login…

2 hours ago

LightSpy Malware Expands With 100+ Commands to Target Users Across All Major OS Platforms

The LightSpy surveillance framework has significantly evolved its operational capabilities, now supporting over 100 commands…

3 hours ago

Critical RCE Vulnerability in MITRE Caldera – Proof of Concept Released

A critical remote code execution (RCE) vulnerability has been uncovered in MITRE Caldera, a widely…

4 hours ago

CISA Alerts: Oracle Agile Vulnerability Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding active…

5 hours ago