CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-1284

Critical Severity
Google
SVRS
84/100

CVSSv3
9.8/10

EPSS
0.0079/1

CVE-2024-1284 is a critical use-after-free vulnerability found in Google Chrome's Mojo component. Prior to version 121.0.6167.160, this flaw allowed remote attackers to potentially trigger heap corruption through specially crafted HTML pages. SOCRadar's Vulnerability Risk Score (SVRS) for CVE-2024-1284 is 84, indicating a critical vulnerability requiring immediate attention. This high SVRS is driven by the "In The Wild" tag, reflecting active exploitation. Successful exploitation could lead to arbitrary code execution, data breaches, or system compromise. Addressing CVE-2024-1284 is paramount to safeguard against potential attacks targeting Google Chrome users.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:H
A:H
2024-02-07

2024-02-14
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-1284 is a use-after-free vulnerability in Mojo in Google Chrome prior to 121.0.6167.160. This vulnerability allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. The CVSS score for this vulnerability is 0, indicating that it is not considered a critical vulnerability. However, the SOCRadar Vulnerability Risk Score (SVRS) for this vulnerability is 0, indicating that it is still a potential threat that should be addressed.

Key Insights:

  1. The vulnerability is a use-after-free issue, which is a common type of vulnerability that can lead to memory corruption and arbitrary code execution.
  2. The vulnerability can be exploited remotely, meaning that an attacker does not need to have physical access to the target system to exploit it.
  3. The vulnerability is rated as High in severity by Chromium, indicating that it is a serious vulnerability that could have a significant impact on the security of affected systems.

Mitigation Strategies:

  1. Update Google Chrome to version 121.0.6167.160 or later.
  2. Use a web browser that is not affected by this vulnerability, such as Firefox or Microsoft Edge.
  3. Disable JavaScript in your web browser.
  4. Be cautious when clicking on links or opening attachments in emails from unknown senders.

Additional Information:

  • There are no known active exploits for this vulnerability at this time.
  • The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning about this vulnerability.
  • The vulnerability is not currently being exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

The February 2024 Security Update Review
Dustin Childs2024-02-12
The February 2024 Security Update Review | It’s the second patch Tuesday of the year, and Adobe and Microsoft have released a fresh crop of security updates just in time to be our Valentine. Take a break from your other activities and join us as we review the details of their latest advisories. For those interested in the Microsoft 0-day discovered by the ZDI Threat Hunting Team, you can watch this special edition of the Patch Report: If you’d rather watch the full video recap covering the
cve-2024-21352
cve-2024-21420
cve-2024-21372
cve-2024-21349

Social Media

(CVE-2024-1284)[1521571][ipcz]UB in ipcz::DriverMemory::Clone() -> UAF is now public. https://t.co/lQip43yIOC
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppGooglechrome
Configuration 2
TypeVendorProduct
OSFedoraprojectfedora

References

ReferenceLink
[email protected]https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html
[email protected]https://issues.chromium.org/issues/41494539
[email protected]https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html
[email protected]https://issues.chromium.org/issues/41494539
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/
[email protected]https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html
[email protected]https://issues.chromium.org/issues/41494539
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/
[email protected]https://lists.fedoraproject.org/archives/list/[email protected]/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/

CWE Details

CWE IDCWE NameDescription
CWE-416Use After FreeReferencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence