CVE-2024-13178
📋 TL;DR
This vulnerability allows attackers to create fake fullscreen interfaces that mimic legitimate websites, tricking users into interacting with malicious content. It affects all users running Google Chrome versions before 128.0.6613.84. The attack requires user interaction with a crafted webpage.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →⚠️ Risk & Real-World Impact
Worst Case
Users could be tricked into entering sensitive information (passwords, credit cards) into fake interfaces that appear to be legitimate websites, leading to credential theft or financial fraud.
Likely Case
Attackers create convincing phishing pages that appear as legitimate fullscreen applications, tricking users into clicking malicious links or downloading malware.
If Mitigated
With proper user awareness training and browser security settings, users would recognize suspicious fullscreen behavior and avoid interacting with untrusted sites.
🎯 Exploit Status
Exploitation requires user to visit a malicious webpage but doesn't require authentication. The attack leverages Chrome's fullscreen implementation flaws.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 128.0.6613.84 and later
Vendor Advisory: https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html
Restart Required: Yes
Instructions:
1. Open Chrome. 2. Click three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the fixed version.
🔧 Temporary Workarounds
Disable automatic fullscreen
allPrevent websites from automatically entering fullscreen mode without user permission
chrome://settings/content/siteDetails?site=https://example.com
Use browser extensions
allInstall security extensions that warn about suspicious fullscreen behavior
🧯 If You Can't Patch
- Use alternative browsers until Chrome can be updated
- Implement network filtering to block known malicious domains hosting exploit pages
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in Settings → About Chrome. If version is below 128.0.6613.84, system is vulnerable.
Check Version:
google-chrome --version (Linux), "C:\Program Files\Google\Chrome\Application\chrome.exe" --version (Windows), /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version (macOS)
Verify Fix Applied:
After updating, verify Chrome version is 128.0.6613.84 or higher in About Chrome.
📡 Detection & Monitoring
Log Indicators:
- Multiple fullscreen permission requests from same domain
- User reports of suspicious fullscreen behavior
Network Indicators:
- HTTP requests to domains hosting known exploit code
- Unusual fullscreen API usage patterns
SIEM Query:
source="chrome_audit_log" AND event="fullscreen_request" AND domain="*suspicious*"