CVE-2024-3840
📋 TL;DR
This vulnerability allows a remote attacker to bypass Chrome's Site Isolation security boundaries by crafting a malicious HTML page. Attackers could potentially access cross-origin data or perform unauthorized actions. All users running vulnerable Chrome versions are affected.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete bypass of Chrome's Site Isolation protections, allowing attackers to access sensitive cross-origin data including authentication tokens, personal information, or perform actions in other sites.
Likely Case
Limited data leakage or unauthorized actions within browser sessions, potentially enabling session hijacking or credential theft.
If Mitigated
Minimal impact with proper browser updates and security controls; isolated browsing sessions prevent significant damage.
🎯 Exploit Status
Exploitation requires user to visit malicious webpage; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 124.0.6367.60 and later
Vendor Advisory: https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html
Restart Required: Yes
Instructions:
1. Open Chrome settings 2. Click 'About Chrome' 3. Chrome will automatically check for and install updates 4. Restart Chrome when prompted
🔧 Temporary Workarounds
Disable JavaScript
allTemporarily disable JavaScript to prevent exploitation
chrome://settings/content/javascript
Use Site Isolation Exceptions
allConfigure Site Isolation to block suspicious sites
chrome://flags/#site-isolation-trial-opt-out
🧯 If You Can't Patch
- Use alternative browsers until Chrome can be updated
- Implement network filtering to block known malicious domains
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in settings; if below 124.0.6367.60, you are vulnerable.
Check Version:
chrome://version/
Verify Fix Applied:
Verify Chrome version is 124.0.6367.60 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual cross-origin requests
- Multiple navigation attempts to different origins
Network Indicators:
- Traffic to known malicious domains hosting exploit code
SIEM Query:
source="chrome" AND (event="navigation" OR event="security") AND status="blocked"
🔗 References
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html
- https://issues.chromium.org/issues/41493458
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html
- https://issues.chromium.org/issues/41493458
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/