Heap Buffer Overflow in WebRTC Could Lead to Heap Corruption
CVE-2023-7024

8.8HIGH

Key Information:

Vendor
Google
Status
Vendor
CVE Published:
21 December 2023

Badges

👾 Exploit Exists🦅 CISA Reported📰 News Worthy

Summary

A critical vulnerability in WebRTC in Google Chrome has been identified, allowing remote attackers to exploit heap corruption via a crafted HTML page. The potential impact is high, as it allows users to take control of the system. The vulnerability has been exploited in the wild, and it is important to update to the latest version of Chrome to mitigate the risk. The exploit requires end user interaction and clicking on a crafted HTML page, which then allows attackers to run malicious code remotely. It is recommended to apply browser updates and ensure protection with a security tool like Morphisec. This vulnerability highlights the importance of timely patching and security vigilance in protecting against advanced cyber threats.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Chrome 120.0.6099.129

News Articles

Weekly VulnRecap - January 8, 2024

Discover what vulnerabilities were exploited in the first week of 2024 — including new and existing ones from Ivanti, Apache, and more.

Threat Bulletin – CVE-2023-7024

Learn how a heap buffer overflow in WebRTC in Google Chrome allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CISA Adds Two Critical Vulnerabilities to Watchlist: CVE-2023-7024 and CVE-2023-7101

CISA has added two new vulnerabilities, CVE-2023-7024 and CVE-2023-7121 to its Known Exploited Vulnerabilities Catalog, in January 2024.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • Vulnerability published

  • 📰

    First article discovered by Bleeping Computer

  • Vulnerability Reserved

.