Article Details

Scrape Timestamp (UTC): 2024-08-22 05:21:12.311

Source: https://thehackernews.com/2024/08/google-fixes-high-severity-chrome-flaw.html

Original Article Text

Click to Toggle View

Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild. Google has rolled out security fixes to address a high-severity security flaw in its Chrome browser that it said has come under active exploitation in the wild. Tracked as CVE-2024-7971, the vulnerability has been described as a type confusion bug in the V8 JavaScript and WebAssembly engine. "Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page," according to a description of the bug in the NIST National Vulnerability Database (NVD). The Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC) have been credited with discovering and reporting the flaw on August 19, 2024. No additional details about the nature of the attacks exploiting the flaw or the identity of the threat actors that may be weaponizing it have been released, primarily to ensure that a majority of the users are updated with a fix. The tech giant, however, acknowledged in a terse statement that it's "aware that an exploit for CVE-2024-7971 exists in the wild." It's worth mentioning that CVE-2024-7971 is the third type confusion bug that it has patched in V8 this year after CVE-2024-4947 and CVE-2024-5274. Google has so far addressed nine zero-days in Chrome since the start of 2024, including three that were demonstrated at Pwn2Own 2024 - Users are recommended to upgrade to Chrome version 128.0.6613.84/.85 for Windows and macOS, and version 128.0.6613.84 for Linux to mitigate potential threats. Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available.

Daily Brief Summary

MALWARE // Google Patches Actively Exploited High-Severity Chrome Flaw

Google has deployed security updates for a high-severity type confusion vulnerability in Chrome, identified as CVE-2024-7971.

The vulnerability affects the V8 JavaScript and WebAssembly engine in versions prior to Chrome 128.0.6613.84.

CVE-2024-7971 enables remote attackers to exploit heap corruption through a crafted HTML page, posing significant security risks.

The flaw was discovered and reported by the Microsoft Threat Intelligence Center and Microsoft Security Response Center on August 19, 2024.

Google confirms the exploit’s existence in the wild but has not disclosed details about the attackers or the nature of the attacks to prioritize widespread user updates.

This flaw is one of three type confusion vulnerabilities fixed in V8 during the year and one of nine zero-days addressed in Chrome since 2024 began.

Upgrading to the latest Chrome versions—128.0.6613.84/.85 for Windows and macOS, and 128.0.6613.84 for Linux—is strongly recommended.

Users of other Chromium-based browsers are advised to update their software to prevent exploitation risks.