CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-1059

Critical Severity
Google
SVRS
77/100

CVSSv3
8.8/10

EPSS
0.00347/1

CVE-2024-1059 is a use-after-free vulnerability impacting Google Chrome before version 121.0.6167.139. This critical flaw in Peer Connection enables a remote attacker to potentially exploit stack corruption by crafting a malicious HTML page. With a SOCRadar Vulnerability Risk Score (SVRS) of 77, this vulnerability is approaching critical levels, suggesting a high degree of active exploitation. The use-after-free condition, categorized as CWE-416, allows an attacker to access or modify memory after it has been freed, leading to unpredictable behavior including crashes or arbitrary code execution. Given that the vulnerability is tagged as "In The Wild," immediate patching is crucial to prevent potential exploits. This vulnerability presents a significant risk because successful exploitation could allow attackers to compromise user systems, steal sensitive data, or launch further attacks. Prioritize updating Chrome to the latest version to mitigate this threat.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:R
S:U
C:H
I:H
A:H
2024-01-30

2024-02-05

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

The February 2024 Security Update Review
Dustin Childs2024-02-12
The February 2024 Security Update Review | It’s the second patch Tuesday of the year, and Adobe and Microsoft have released a fresh crop of security updates just in time to be our Valentine. Take a break from your other activities and join us as we review the details of their latest advisories. For those interested in the Microsoft 0-day discovered by the ZDI Threat Hunting Team, you can watch this special edition of the Patch Report: If you’d rather watch the full video recap covering the
cve-2024-21352
cve-2024-21420
cve-2024-21372
cve-2024-21349

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppGooglechrome
Configuration 2
TypeVendorProduct
OSFedoraprojectfedora

References

ReferenceLink
[email protected]https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html
[email protected]https://crbug.com/1514777
[email protected]https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html
[email protected]https://crbug.com/1514777
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/
[email protected]https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html
[email protected]https://crbug.com/1514777
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/

CWE Details

CWE IDCWE NameDescription
CWE-416Use After FreeReferencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence