Google Releases Eighth Zero-Day Patch of 2023 for Chrome (2024)

Google Releases Eighth Zero-Day Patch of 2023 for Chrome (1)

Source: PREMIO STOCK via Shutterstock

Google has issued an urgent update to address a recently discovered vulnerability in Chrome that has been under active exploitation in the wild, marking the eighth zero-day vulnerability identified for the browser in 2023.

Identified as CVE-2023-7024, Google said the vulnerability is a significant heap buffer overflow flaw within Chrome's WebRTC module that allows remote code execution (RCE).

WebRTC is an open source initiative enabling real-time communication through APIs, and enjoys widespread support among the leading browser makers.

How CVE-2023-7024 Threatens Chrome Users

Lionel Litty, chief security architect at Menlo Security, explains that risk from exploitation is the ability to achieve RCE in the renderer process. This means a bad actor can run arbitrary binary code on the user's machine, outside of the JavaScript sandbox.

However, real damage relies on using the bug as the first step in an exploit chain; it needs to be combined with a sandbox escape vulnerability in either Chrome itself or the OS to be truly dangerous.

"This code is still sandboxed due to the multiprocess architecture of Chrome though," Litty says, "so with just this vulnerability an attacker cannot access the user's files or start deploying malware, and their foothold on the machine goes away when the impacted tab is closed."

He points out Chrome's Site Isolation feature will generally protect data from other sites, so an attacker can't target the victim's banking information, although he adds there are some subtle caveats here.

For example, this would expose a target origin to the malicious origin if they use the same site: In other words, a hypothetical malicious.shared.com can target victim.shared.com.

"While access to the microphone or camera requires user consent, access to WebRTC itself does not," Litty explains. "It is possible this vulnerability can be targeted by any website without requiring any user input beyond visiting the malicious page, so from this perspective the threat is significant."

Aubrey Perin, lead threat intelligence analyst at Qualys Threat Research Unit, notes that the reach of the bug extends beyond Google Chrome.

"The exploitation of Chrome is tied to its ubiquity — even Microsoft Edge uses Chromium," he says. "So, exploiting Chrome could also potentially target Edge users and allow bad actors a wider reach."

And it should be noted that Android mobile devices using Chrome have their own risk profile; they put multiple sites in the same renderer process in some scenarios, especially on devices that do not have a lot of RAM.

Browsers Remain a Top Cyberattack Target

Major browser vendors have recently reported a growing number of zero-day bugs — Google alone reported five since August.

Apple, Microsoft, and Firefox are among the others that have disclosed a series of critical vulnerabilities in their browsers, including some zero-days.

Joseph Carson, chief security scientist and Advisory CISO at Delinea, says it's no surprise that government sponsored hackers and cybercriminals target the popular software, constantly searching for vulnerabilities to exploit.

"This typically leads to a larger attack surface due to the software's widespread usage, multiple platforms, high-value targets, and usually opens the door to supply chain attacks," he says.

He notes these types of vulnerabilities also take time for many users to update and patch vulnerable systems.

"Therefore, attackers will likely target these vulnerable systems for many months to come," Carson says.

He adds, "As this vulnerability is being actively exploited, it likely means that many users systems have already been compromised and it would be important to be able to identify devices that have been targeted and quickly patch those systems."

As a result, Carson notes, organizations should investigate sensitive systems with this vulnerability to determine any risks or potential material impact.

Google Releases Eighth Zero-Day Patch of 2023 for Chrome (2024)
Top Articles
An In-Depth Look at Crypto-Crime in 2023 Part 1
What happens if TikTok is banned?
Whas Golf Card
Dannys U Pull - Self-Service Automotive Recycling
Usborne Links
9192464227
Fully Enclosed IP20 Interface Modules To Ensure Safety In Industrial Environment
Umn Pay Calendar
Lesson 1 Homework 5.5 Answer Key
Student Rating Of Teaching Umn
Sotyktu Pronounce
Turbocharged Cars
Power Outage Map Albany Ny
Winterset Rants And Raves
Bad Moms 123Movies
National Weather Service Denver Co Forecast
Kitty Piggy Ssbbw
Wicked Local Plymouth Police Log 2022
Chelactiv Max Cream
Kiddle Encyclopedia
Kountry Pumpkin 29
[Cheryll Glotfelty, Harold Fromm] The Ecocriticism(z-lib.org)
Lisas Stamp Studio
Chicago Based Pizza Chain Familiarly
Dmv In Anoka
Preggophili
2023 Ford Bronco Raptor for sale - Dallas, TX - craigslist
Skidware Project Mugetsu
Effingham Daily News Police Report
O'reilly's In Monroe Georgia
Things to do in Pearl City: Honolulu, HI Travel Guide by 10Best
Does Royal Honey Work For Erectile Dysfunction - SCOBES-AR
Bridgestone Tire Dealer Near Me
Uky Linkblue Login
Chadrad Swap Shop
What does wym mean?
Solarmovie Ma
Bus Dublin : guide complet, tarifs et infos pratiques en 2024 !
Indiana Immediate Care.webpay.md
All Things Algebra Unit 3 Homework 2 Answer Key
Dreammarriage.com Login
About Us | SEIL
Retire Early Wsbtv.com Free Book
Synchrony Manage Account
Sadie Sink Doesn't Want You to Define Her Style, Thank You Very Much
Magicseaweed Capitola
Unifi Vlan Only Network
How much does Painttool SAI costs?
Keir Starmer looks to Italy on how to stop migrant boats
Vérificateur De Billet Loto-Québec
Fetllife Com
Affidea ExpressCare - Affidea Ireland
Latest Posts
Article information

Author: Dan Stracke

Last Updated:

Views: 6392

Rating: 4.2 / 5 (63 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Dan Stracke

Birthday: 1992-08-25

Address: 2253 Brown Springs, East Alla, OH 38634-0309

Phone: +398735162064

Job: Investor Government Associate

Hobby: Shopping, LARPing, Scrapbooking, Surfing, Slacklining, Dance, Glassblowing

Introduction: My name is Dan Stracke, I am a homely, gleaming, glamorous, inquisitive, homely, gorgeous, light person who loves writing and wants to share my knowledge and understanding with you.