CVE-2024-0804
📋 TL;DR
This vulnerability allows attackers to bypass Chrome's cross-origin security policies on iOS devices, enabling them to read data from other websites visited by the user. It affects Google Chrome on iOS prior to version 121.0.6167.85. Users who haven't updated their Chrome browser on iOS are vulnerable to data leakage attacks.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal sensitive data like authentication tokens, personal information, or financial data from other websites the user has open in Chrome tabs.
Likely Case
Targeted attacks stealing session cookies or authentication tokens from popular websites to hijack user accounts.
If Mitigated
Minimal impact with proper browser updates and security controls in place.
🎯 Exploit Status
Exploitation requires user to visit a malicious webpage but no additional user interaction. The bug report suggests relatively straightforward exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 121.0.6167.85
Vendor Advisory: https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html
Restart Required: Yes
Instructions:
1. Open Chrome on iOS device. 2. Go to Settings > About Chrome. 3. Chrome will automatically check for updates. 4. If update is available, tap 'Update'. 5. Restart Chrome after update completes.
🔧 Temporary Workarounds
Use alternative browser
iosTemporarily use Safari or another browser until Chrome is updated
Disable JavaScript
iosDisable JavaScript in Chrome settings to prevent exploitation (breaks most websites)
🧯 If You Can't Patch
- Restrict access to untrusted websites using web filtering or proxy controls
- Implement network segmentation to limit data that could be leaked from internal systems
🔍 How to Verify
Check if Vulnerable:
Open Chrome on iOS, go to Settings > About Chrome, check if version is below 121.0.6167.85
Check Version:
Not applicable for iOS - check via Chrome settings menu
Verify Fix Applied:
Confirm Chrome version is 121.0.6167.85 or higher in Settings > About Chrome
📡 Detection & Monitoring
Log Indicators:
- Unusual cross-origin requests in web server logs
- Multiple failed CORS policy violations from same user session
Network Indicators:
- Suspicious JavaScript loading patterns
- Unusual iframe or window.opener usage patterns
SIEM Query:
Not specifically applicable - monitor for Chrome update compliance on iOS devices
🔗 References
- https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html
- https://crbug.com/1515137
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/
- https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html
- https://crbug.com/1515137
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/