Sandbox Escape Vulnerability in Visuals in Google Chrome

CVE-2024-4671

9.6CRITICAL

Key Information

Vendor
Google
Status
Chrome
Vendor
CVE Published:
14 May 2024

Badges

😄 Trended👾 Exploit Exists📰 News Worthy

What is CVE-2024-4671?

CVE-2024-4671 is a high-severity vulnerability found in Google Chrome, specifically within the Visuals component. This vulnerability stems from a "use after free" error, which can be exploited by remote attackers who have managed to compromise the renderer process of the browser. By crafting a malicious HTML page, an attacker could potentially escape the browser's sandbox environment, leading to significant security concerns. Given that Chrome is a widely used web browser across numerous organizations, this vulnerability poses a serious risk to sensitive data and operations, making it crucial for users to apply updates promptly.

Technical Details

The flaw involves a "use after free" issue, which occurs when a program continues to use memory after it has been freed. In this case, the vulnerability is within the Visuals component of Google Chrome, impacting versions prior to 124.0.6367.201. By manipulating the renderer process, an attacker can execute code outside of the intended sandbox restrictions, thereby gaining more control over the user's system than would typically be allowed. This exploit requires that the attacker successfully lure the user to interact with the malicious HTML content, which can be embedded in various formats, including phishing emails or compromised websites.

Impact of the Vulnerability

  1. Potential for Sandbox Escape: The primary concern is the ability for attackers to escape the sandbox environment designed to isolate web content. This could allow them to execute arbitrary code on the host system, increasing the risk of further malicious activities.

  2. Data Compromise: By effectively gaining unauthorized access to the underlying operating system, attackers could access sensitive information stored in the browser, such as passwords, financial data, or private communications.

  3. Increased Attack Surface: The exploit of CVE-2024-4671 could lead to broader attacks on organizational infrastructure, as compromised systems can be used as footholds to launch additional attacks or spread malware within corporate environments.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2024-4671 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Chrome < 124.0.6367.201

News Articles

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Russian hackers exploit patched Safari and Chrome flaws in attacks on Mongolian government websites, targeting mobile users.

4 months ago

Chrome浏览器存在远程代码执行漏洞(CVE-2024-4671)

Chrome浏览器UAF漏洞 (CVE-2024-4671) Google Chrome是一款广泛使用的跨平台Web浏览器,由Google开发。它基于Chromium开源项目,提供快速、安全和用户友好的浏览体验。Chrome浏览器在全球拥有大量用户,是最受欢迎的Web浏览器之一。 01 漏洞描述 漏洞类型:Chrome浏览器UAF漏洞...

4 months ago

Google discloses 2 zero-day vulnerabilities in less than a week | T...

Google said two zero-day vulnerabilities, tracked as CVE-2024-4761 and CVE-2024-4671, have exploits available in the wild.

7 months ago

Refferences

CVSS V3.1

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • CISA Reported

  • Vulnerability started trending

  • 👾

    Exploit known to exist

  • First article discovered by SecurityWeek

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseCISA DatabaseGoogle Feed14 News Article(s)
.