CVE-2024-3157

9.6 CRITICAL

📋 TL;DR

This vulnerability allows a remote attacker who has already compromised Chrome's GPU process to perform a sandbox escape via specific UI gestures, potentially gaining full system access. It affects Google Chrome users running versions prior to 123.0.6312.122. The high CVSS score reflects the severe impact of sandbox escape vulnerabilities.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 123.0.6312.122
Operating Systems: Windows, Linux, macOS, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires initial GPU process compromise before sandbox escape can be attempted.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains full control over the victim's machine, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attacker escapes Chrome's sandbox to execute arbitrary code with system-level privileges, potentially installing malware or accessing sensitive system resources.

🟢

If Mitigated

If Chrome's sandbox remains intact, the impact is limited to the sandboxed process only, preventing system-wide compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires chaining with another vulnerability to first compromise the GPU process, then triggering the out-of-bounds memory access via specific UI gestures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 123.0.6312.122 and later

Vendor Advisory: https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click the three-dot menu. 3. Go to Help > About Google Chrome. 4. Chrome will automatically check for and install updates. 5. Click 'Relaunch' to restart Chrome with the patched version.

🔧 Temporary Workarounds

Disable GPU acceleration

all

Disabling GPU acceleration may prevent exploitation by removing the vulnerable GPU process component.

chrome://settings/system
Toggle 'Use hardware acceleration when available' to OFF

🧯 If You Can't Patch

  • Restrict browser usage to trusted websites only and implement strict web filtering.
  • Deploy application whitelisting to prevent unauthorized browser execution.

🔍 How to Verify

Check if Vulnerable:

Check Chrome version by navigating to chrome://settings/help or clicking Help > About Google Chrome.

Check Version:

google-chrome --version (Linux) or "C:\Program Files\Google\Chrome\Application\chrome.exe" --version (Windows)

Verify Fix Applied:

Verify Chrome version is 123.0.6312.122 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with GPU process termination
  • Unexpected Chrome restarts with sandbox violation errors

Network Indicators:

  • Unusual outbound connections following Chrome GPU process crashes

SIEM Query:

source="chrome_logs" AND (event="gpu_process_crash" OR event="sandbox_violation")

🔗 References

📤 Share & Export