Heap Buffer Overflow in WebRTC Could Lead to Heap Corruption
Key Information
- Vendor
- Status
- Chrome
- Vendor
- CVE Published:
- 21 December 2023
Badges
Summary
A critical vulnerability in WebRTC in Google Chrome has been identified, allowing remote attackers to exploit heap corruption via a crafted HTML page. The potential impact is high, as it allows users to take control of the system. The vulnerability has been exploited in the wild, and it is important to update to the latest version of Chrome to mitigate the risk. The exploit requires end user interaction and clicking on a crafted HTML page, which then allows attackers to run malicious code remotely. It is recommended to apply browser updates and ensure protection with a security tool like Morphisec. This vulnerability highlights the importance of timely patching and security vigilance in protecting against advanced cyber threats.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2023-7024 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
Chrome < 120.0.6099.129
News Articles
Weekly VulnRecap - January 8, 2024
Discover what vulnerabilities were exploited in the first week of 2024 — including new and existing ones from Ivanti, Apache, and more.
10 months ago
Threat Bulletin – CVE-2023-7024
Learn how a heap buffer overflow in WebRTC in Google Chrome allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
10 months ago
CISA Adds Two Critical Vulnerabilities to Watchlist: CVE-2023-7024 and CVE-2023-7101
CISA has added two new vulnerabilities, CVE-2023-7024 and CVE-2023-7121 to its Known Exploited Vulnerabilities Catalog, in January 2024.
11 months ago
CVSS V3.1
Timeline
- 👾
Exploit exists.
Vulnerability published.
First article discovered by Bleeping Computer
Vulnerability Reserved.