CVE-2024-1077

8.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Google Chrome's Network component that allows remote attackers to potentially exploit heap corruption via malicious files. Attackers could execute arbitrary code or cause denial of service. All users running vulnerable versions of Chrome are affected.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: Prior to 121.0.6167.139
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Enterprise deployments with older versions are at highest risk.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Browser crash (denial of service) or limited code execution within browser sandbox.

🟢

If Mitigated

No impact if Chrome is updated to patched version or if exploit attempts are blocked by security controls.

🌐 Internet-Facing: HIGH - Attackers can deliver exploit via web content, email attachments, or downloads.
🏢 Internal Only: MEDIUM - Risk exists if users access malicious content internally, but external attack surface is primary concern.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Use-after-free vulnerabilities in Chrome's network stack typically require user interaction (opening malicious file) but can be chained with other vulnerabilities for sandbox escape.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 121.0.6167.139 and later

Vendor Advisory: https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html

Restart Required: Yes

Instructions:

1. Open Chrome 2. Click menu (three dots) → Help → About Google Chrome 3. Chrome will automatically check for and install updates 4. Click Relaunch to restart Chrome

🔧 Temporary Workarounds

Disable automatic file downloads

all

Configure Chrome to ask before downloading files to prevent automatic execution of malicious content

chrome://settings/content/automaticDownloads → Toggle off 'Download multiple files automatically'

🧯 If You Can't Patch

  • Deploy application control to block execution of Chrome below version 121.0.6167.139
  • Implement network filtering to block known malicious file types and suspicious download sources

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: If version is below 121.0.6167.139, system is vulnerable

Check Version:

chrome://version/ (on Chrome) or google-chrome --version (command line)

Verify Fix Applied:

Confirm Chrome version is 121.0.6167.139 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with network component errors
  • Unexpected Chrome process termination events

Network Indicators:

  • Unusual file downloads to Chrome users
  • Multiple Chrome instances crashing from same source

SIEM Query:

source="chrome_crash_reports" AND component="network" AND version<"121.0.6167.139"

🔗 References

📤 Share & Export