CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-0517

Critical Severity
Google
SVRS
82/100

CVSSv3
8.8/10

EPSS
0.58012/1

CVE-2024-0517 is a critical security vulnerability in Google Chrome's V8 engine. This out-of-bounds write vulnerability allows a remote attacker to potentially exploit heap corruption by crafting a malicious HTML page. With a SOCRadar Vulnerability Risk Score (SVRS) of 82, this vulnerability is considered critical and requires immediate attention. The high SVRS highlights the elevated risk due to observed exploitation 'In The Wild'. Successful exploitation could lead to arbitrary code execution, allowing attackers to gain control of the affected system. Given the high CVSS score of 8.8 and the elevated SVRS score, organizations should prioritize patching Chrome installations to version 120.0.6099.224 or higher to mitigate the risk. The associated CWE-787 signifies the dangerous nature of out-of-bounds write vulnerabilities, commonly exploited for malicious purposes.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:R
S:U
C:H
I:H
A:H
2024-01-16

2024-01-22
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-0517 is a critical vulnerability in Google Chrome prior to version 120.0.6099.224. It allows a remote attacker to potentially exploit heap corruption via a crafted HTML page, leading to arbitrary code execution. The Common Vulnerability Scoring System (CVSS) has assigned a score of 0 to this vulnerability, indicating its low severity. However, SOCRadar's unique 'SOCRadar Vulnerability Risk Score' (SVRS) assigns a score of 34, highlighting the urgency and severity of the threat.

Key Insights:

  1. Active Exploitation: Threat actors are actively exploiting this vulnerability in the wild, making it a high-priority target for attackers.
  2. High Impact: Successful exploitation of this vulnerability could allow attackers to execute arbitrary code on the victim's system, leading to complete system compromise.
  3. Wide Attack Surface: Google Chrome is a widely used browser, making this vulnerability a potential threat to a large number of users.
  4. Limited Mitigation: Currently, there is no official patch available for this vulnerability, making it crucial for users to take immediate steps to mitigate the risk.

Mitigation Strategies:

  1. Update Software: Users should immediately update Google Chrome to version 120.0.6099.224 or later to mitigate the risk of exploitation.
  2. Enable Enhanced Protection: Users should enable Enhanced Protection in Google Chrome to block potentially malicious websites and downloads.
  3. Use a Web Application Firewall (WAF): Organizations should implement a WAF to block malicious traffic and protect against attacks targeting this vulnerability.
  4. Educate Users: Organizations should educate their users about the risks associated with this vulnerability and encourage them to practice safe browsing habits.

Additional Information:

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

5th February – Threat Intelligence Report - Check Point Research
2024-02-05
5th February – Threat Intelligence Report - Check Point Research | News Content: For the latest discoveries in cyber research for the week of 5th February, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES AnyDesk Software GmbH , the company behind the popular remote desktop application, has confirmed a cybersecurity incident in which the attackers gained access to company’s production systems. Reportedly, source code and private code signing keys were stolen during the attack. As part of the response, AnyDesk have revoked security-related certificates and remediated or replaced systems as necessary. Out of caution, AnyDesk is also revoking all passwords
cve-2024-21888
cve-2024-0517
cve-2024-0402
cve-2024-21893
Google fixes actively exploited Chrome zero-day (CVE-2024-0519) - Help Net Security
2024-01-17
Google fixes actively exploited Chrome zero-day (CVE-2024-0519) - Help Net Security | News Content: In the new stable release of the Chrome browser, Google has fixed three security vulnerabilities affecting the V8 engine, including one zero-day (CVE-2024-0519) with an existing exploit. About CVE-2024-0519 V8 is an open-source JavaScript and WebAssembly engine developed by the Chromium Project for Chromium and Google Chrome web browsers. CVE-2024-0519 is an (obviously exploitable) out of bounds memory access that, as noted by NIST, “allowed a remote attacker to potentially exploit heap corruption via a crafted HTML
google.com
rss
forum
news
5th February – Threat Intelligence Report - Check Point Research - Check Point Research
2024-02-05
5th February – Threat Intelligence Report - Check Point Research - Check Point Research | News Content: For the latest discoveries in cyber research for the week of 5th February, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES AnyDesk Software GmbH , the company behind the popular remote desktop application, has confirmed a cybersecurity incident in which the attackers gained access to company’s production systems. Reportedly, source code and private code signing keys were stolen during the attack. As part of the response, AnyDesk have revoked security-related certificates and remediated or replaced systems as necessary. Out of caution, AnyDesk is also
google.com
rss
forum
news
Google fixes first actively exploited Chrome zero-day of 2024 - BleepingComputer
2024-01-16
Google fixes first actively exploited Chrome zero-day of 2024 - BleepingComputer | News Content: By Sergiu Gatlan 02:13 PM Google has released security updates to fix the first Chrome zero-day vulnerability exploited in the wild since the start of the year. "Google is aware of reports that an exploit for CVE-2024-0519 exists in the wild," the company said in a security advisory published Tuesday. The company fixed the zero-day for users in the Stable Desktop channel, with patched versions rolling out worldwide to Windows (120.0.6099.224/225), Mac (120.0.6099.234), and Linux (120.0.6099.224) users less than a week
google.com
rss
forum
news

Social Media

@richg0ldman Hey @GrapheneOS, may I address this to you? Is or will be Vanadium patched for CVE-2024-0517 vulnerability?
0
0
1
CVE-2024-0517 (Out of Bounds Write in V8) https://t.co/4wkPzauTsA
0
1
8

Affected Software

Configuration 1
TypeVendorProduct
AppGooglechrome
Configuration 2
TypeVendorProduct
OSFedoraprojectfedora

References

ReferenceLink
[email protected]https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
[email protected]https://crbug.com/1515930
[email protected]https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
[email protected]https://crbug.com/1515930
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/

CWE Details

CWE IDCWE NameDescription
CWE-787Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence