CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-0333

High Severity
Google
SVRS
52/100

CVSSv3
5.3/10

EPSS
0.00052/1

CVE-2024-0333 allows a remote attacker to install malicious extensions in Google Chrome. This vulnerability stems from insufficient data validation within the Extensions component of Google Chrome versions prior to 120.0.6099.216. A privileged network position enables the attacker to inject a specially crafted HTML page, bypassing security measures.

While the CVSS score is 5.3, SOCRadar's Vulnerability Risk Score (SVRS) is 52, indicating a moderate risk. Although not critical (SVRS > 80), organizations should still address CVE-2024-0333 promptly to prevent unauthorized extension installations. Successful exploitation could lead to data theft, malware deployment, or other malicious activities within the affected Chrome browser. This highlights the importance of keeping Chrome browsers updated to the latest versions. The vulnerability is classified as NVD-CWE-noinfo indicating a lack of specific information about the nature of the weakness beyond the description.

No tags available
CVSS:3.1
AV:N
AC:H
PR:N
UI:R
S:U
C:N
I:H
A:N
2024-01-10

2024-01-18
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-0333 is a vulnerability in Google Chrome that allows an attacker in a privileged network position to install a malicious extension via a crafted HTML page. This vulnerability is rated as High in severity by Chromium and has a SVRS of 52, indicating a moderate risk.

Key Insights

  • Insufficient data validation: The vulnerability is caused by insufficient data validation in the Extensions feature of Google Chrome. This allows an attacker to craft an HTML page that can bypass the validation checks and install a malicious extension.
  • Privileged network position: The attacker must be in a privileged network position to exploit this vulnerability. This means that the attacker must be able to access the victim's network and send them a specially crafted HTML page.
  • Malicious extensions: The attacker can use the malicious extension to gain access to the victim's browsing data, steal their credentials, or install additional malware.

Mitigation Strategies

  • Update Google Chrome: The vulnerability has been patched in Google Chrome version 120.0.6099.216. Users should update their browsers to the latest version as soon as possible.
  • Disable extensions: Users can disable all extensions in their browsers to prevent the exploitation of this vulnerability.
  • Use a firewall: A firewall can help to block malicious traffic from reaching the victim's network.
  • Educate users: Users should be educated about the risks of clicking on links from unknown sources.

Additional Information

  • Threat Actors/APT Groups: There are no known threat actors or APT groups that are actively exploiting this vulnerability.
  • Exploit Status: There are no known active exploits for this vulnerability.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: This vulnerability is not currently being exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

https://t.co/yToZYShNE4 @malcolmst recounts his discovery of CVE-2024-0333, a vulnerability in Google Chrome that could have been exploited to enable the installation of malicious extensions.
0
0
1

Affected Software

Configuration 1
TypeVendorProduct
AppGooglechrome
Configuration 2
TypeVendorProduct
OSFedoraprojectfedora

References

ReferenceLink
[email protected]https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_9.html
[email protected]https://crbug.com/1513379
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/IPYCYENYQYADCOS6XG4JITUVRZ6HTE2B/
[email protected]https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_9.html
[email protected]https://crbug.com/1513379
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/4BXC7FJIAZRY3P72XC4Z4UOW2QDA7YX7/
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/IPYCYENYQYADCOS6XG4JITUVRZ6HTE2B/

CWE Details

No CWE details found for this CVE

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence