CVE-2024-1675

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass Chrome's download restrictions via a malicious HTML page, potentially enabling unauthorized file system access. It affects Google Chrome users on all platforms running versions before 122.0.6261.57. The medium severity rating reflects the need for user interaction but significant potential impact.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 122.0.6261.57
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Enterprise deployments with custom policies may have some mitigation.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could download malicious files to restricted system locations, potentially leading to system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Users visiting malicious websites could have unwanted files downloaded to their system, potentially leading to malware infection or data exfiltration.

🟢

If Mitigated

With proper security controls, the impact is limited to isolated browser sessions without system-wide consequences.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (visiting malicious page) but no authentication. The vulnerability is in the download policy enforcement mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 122.0.6261.57 and later

Vendor Advisory: https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the patched version.

🔧 Temporary Workarounds

Disable automatic downloads

all

Configure Chrome to ask where to save each file before downloading

chrome://settings/downloads → Toggle 'Ask where to save each file before downloading' to ON

Enable Enhanced Safe Browsing

all

Provides additional protection against malicious websites

chrome://settings/security → Enable 'Enhanced protection'

🧯 If You Can't Patch

  • Deploy network filtering to block known malicious websites
  • Implement application whitelisting to prevent unauthorized file execution

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in chrome://settings/help or via 'chrome://version'

Check Version:

google-chrome --version (Linux/Mac) or wmic datafile where name="C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" get version (Windows)

Verify Fix Applied:

Confirm Chrome version is 122.0.6261.57 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual download patterns from Chrome
  • Files downloaded to unusual locations
  • Multiple download attempts from single sessions

Network Indicators:

  • Connections to suspicious domains followed by file downloads
  • Unusual download traffic patterns

SIEM Query:

source="chrome" AND (event="download" OR event="file_save") AND file_path NOT IN ["Downloads", "Desktop"]

🔗 References

📤 Share & Export