Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel.
The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the browser’s Visuals component that could allow an attacker to execute arbitrary code on a victim’s system.
Successful exploitation would give the attacker the same privileges as the logged-in user, potentially enabling them to install malware, steal data, or create new user accounts with full access.
Join 400,000 Security professionals using the ANY RUN Malware Analysis sandbox: Sign up for free
According to the MS-ISAC advisory, the vulnerability was being exploited in the wild, making it a critical risk for unpatched systems.
Google acknowledged the existence of an exploit but did not provide further details to allow users time to apply the update.
High CVE-2024-4671: Use after free in Visuals. Reported by Anonymous on 2024-05-07
“Google is aware that an exploit for CVE-2024-4671 exists in the wild.”
The 124.0.6367.201 update is now available for users on the Stable channel, which is the main release branch recommended for most users after thorough testing.
The Extended Stable channel, which receives updates on a slower 8-week cycle, has also been updated to 124.0.6367.201.
Google credited an anonymous researcher with reporting the CVE-2024-4671 vulnerability. This release did not include any other security fixes.
According to Cyber Security News, this is Google’s sixth Chrome zero-day patch in 2024.
In April, Google fixed two other zero-day vulnerabilities, CVE-2024-2887 and CVE-2024-2886, that were exploited at the Pwn2Own Vancouver 2024 hacking competition
Users are strongly advised to update their Chrome installations as soon as possible to protect against potential attacks exploiting this critical vulnerability.
The update will roll out automatically over the coming days and weeks, but users can manually trigger the update by going to Chrome’s About menu.
Chrome is one of the world’s most widely used web browsers, making this vulnerability a significant security risk. Keeping software up-to-date with the latest security patches is crucial for protecting systems and data from emerging threats.
Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial…
A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which…
The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees…
NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets…