Vulnerability

Warning! Google Chrome Zero-day Vulnerability Exploited in Wild

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel.

The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the browser’s Visuals component that could allow an attacker to execute arbitrary code on a victim’s system.

Successful exploitation would give the attacker the same privileges as the logged-in user, potentially enabling them to install malware, steal data, or create new user accounts with full access.

Join 400,000 Security professionals using the ANY RUN Malware Analysis sandbox: Sign up for free

According to the MS-ISAC advisory, the vulnerability was being exploited in the wild, making it a critical risk for unpatched systems.

Google acknowledged the existence of an exploit but did not provide further details to allow users time to apply the update.

High CVE-2024-4671: Use after free in Visuals. Reported by Anonymous on 2024-05-07

“Google is aware that an exploit for CVE-2024-4671 exists in the wild.”

The 124.0.6367.201 update is now available for users on the Stable channel, which is the main release branch recommended for most users after thorough testing.

The Extended Stable channel, which receives updates on a slower 8-week cycle, has also been updated to 124.0.6367.201.

Google credited an anonymous researcher with reporting the CVE-2024-4671 vulnerability. This release did not include any other security fixes.

According to Cyber Security News, this is Google’s sixth Chrome zero-day patch in 2024.

In April, Google fixed two other zero-day vulnerabilities, CVE-2024-2887 and CVE-2024-2886, that were exploited at the Pwn2Own Vancouver 2024 hacking competition

Users are strongly advised to update their Chrome installations as soon as possible to protect against potential attacks exploiting this critical vulnerability.

The update will roll out automatically over the coming days and weeks, but users can manually trigger the update by going to Chrome’s About menu.

Chrome is one of the world’s most widely used web browsers, making this vulnerability a significant security risk. Keeping software up-to-date with the latest security patches is crucial for protecting systems and data from emerging threats.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

SWARM – Switchable Backdoor Attack Against Pre-trained Models

In the big data era, pre-training large vision transformer (ViT) models on massive datasets has become prevalent for enhanced performance…

3 hours ago

Critical Git Vulnerability Let Attackers Execute Remote Code : PoC Published

A critical remote code execution vulnerability has been discovered in the git clone which was assigned with CVE-2024-32002 and the…

3 hours ago

Akira Ransomware Escalates Privilege To Exfiltrate Domain Controller Files

In a recent encounter, the Akira ransomware group exploited a novel privilege escalation technique, where the attackers infiltrated the victim's…

4 hours ago

Financial Organizations Need To Disclose Data Breach Within 30-Days

The U.S. Securities and Exchange Commission (SEC) has made changes to Regulation S-P that require financial companies to report data…

4 hours ago

Two Chinese Nationals Arrested for Stealing $73M+ Via Cryptocurrency Scams

Two Chinese people have been arrested on suspicion of being involved in a complex cryptocurrency trading scam that stole more…

6 hours ago

PoC Exploit Published for 0-day Vulnerability in Google Chrome

A proof-of-concept (PoC) exploit for a critical zero-day vulnerability (CVE-2024-4947) in Google Chrome has been made public. The potential for…

7 hours ago