CVE-2024-13178

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to create fake fullscreen interfaces that mimic legitimate websites, tricking users into interacting with malicious content. It affects all users running Google Chrome versions before 128.0.6613.84. The attack requires user interaction with a crafted webpage.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 128.0.6613.84
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Chromium-based browsers (Edge, Brave, etc.) may also be affected if they haven't incorporated the fix.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into entering sensitive information (passwords, credit cards) into fake interfaces that appear to be legitimate websites, leading to credential theft or financial fraud.

🟠

Likely Case

Attackers create convincing phishing pages that appear as legitimate fullscreen applications, tricking users into clicking malicious links or downloading malware.

🟢

If Mitigated

With proper user awareness training and browser security settings, users would recognize suspicious fullscreen behavior and avoid interacting with untrusted sites.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to visit a malicious webpage but doesn't require authentication. The attack leverages Chrome's fullscreen implementation flaws.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 128.0.6613.84 and later

Vendor Advisory: https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the fixed version.

🔧 Temporary Workarounds

Disable automatic fullscreen

all

Prevent websites from automatically entering fullscreen mode without user permission

chrome://settings/content/siteDetails?site=https://example.com

Use browser extensions

all

Install security extensions that warn about suspicious fullscreen behavior

🧯 If You Can't Patch

  • Use alternative browsers until Chrome can be updated
  • Implement network filtering to block known malicious domains hosting exploit pages

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in Settings → About Chrome. If version is below 128.0.6613.84, system is vulnerable.

Check Version:

google-chrome --version (Linux), "C:\Program Files\Google\Chrome\Application\chrome.exe" --version (Windows), /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version (macOS)

Verify Fix Applied:

After updating, verify Chrome version is 128.0.6613.84 or higher in About Chrome.

📡 Detection & Monitoring

Log Indicators:

  • Multiple fullscreen permission requests from same domain
  • User reports of suspicious fullscreen behavior

Network Indicators:

  • HTTP requests to domains hosting known exploit code
  • Unusual fullscreen API usage patterns

SIEM Query:

source="chrome_audit_log" AND event="fullscreen_request" AND domain="*suspicious*"

🔗 References

📤 Share & Export