Rewterz
Severe Atlassian Vulnerability Exploited to Install Linux Version of Cerber Ransomware – Active IOCs
April 18, 2024
Rewterz
Cybercriminals Exploit Fortinet Vulnerability to Deploy ScreenConnect and Metasploit – Active IOCs
April 18, 2024

Multiple Google Chrome Vulnerabilities

Severity

High

Analysis Summary

CVE-2024-3847 CVSS:6.5

Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient policy enforcement in WebUI. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2024-3846 CVSS:6.5

Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Prompts. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2024-3845 CVSS:6.5

Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Network. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2024-3844 CVSS:6.5

Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Extensions. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2024-3843 CVSS:6.5

Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient data validation in Downloads. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2024-3841 CVSS:6.5

Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient data validation in Browser Switcher. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2024-3840 CVSS:6.5

Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient policy enforcement in Site Isolation. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2024-3839 CVSS:6.5

Google Chrome could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in Fonts. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to obtain sensitive information.

CVE-2024-3838 CVSS:6.5

Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Autofill. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.

CVE-2024-3837 CVSS:8.8

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in QUIC. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-3834 CVSS:8.8

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Downloads. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-3833 CVSS:8.8

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by object corruption in WebAssembly. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-3832 CVSS:8.8

Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by object corruption in V8. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.

Impact

  • Security Bypass
  • Information Disclosure
  • Gain Access

Indicators of Compromise

CVE

  • CVE-2024-3847
  • CVE-2024-3846
  • CVE-2024-3845
  • CVE-2024-3844
  • CVE-2024-3843
  • CVE-2024-3841
  • CVE-2024-3840
  • CVE-2024-3839
  • CVE-2024-3838
  • CVE-2024-3837
  • CVE-2024-3834
  • CVE-2024-3833
  • CVE-2024-3832

Affected Vendors

Google

Affected Products

  • Google Chrome 124.0

Remediation

Upgrade to the latest version of Google Chrome, available from the Google Chrome Releases Website.

Google Chrome Releases Website