CVE-2024-6779

9.6 CRITICAL

📋 TL;DR

This vulnerability in Chrome's V8 JavaScript engine allows out-of-bounds memory access that could enable sandbox escape. Attackers could potentially execute arbitrary code outside Chrome's sandbox by tricking users into visiting malicious web pages. All Chrome users prior to version 126.0.6478.182 are affected.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 126.0.6478.182
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Extensions or security settings don't mitigate this vulnerability.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via sandbox escape leading to arbitrary code execution with user privileges, potentially enabling further privilege escalation.

🟠

Likely Case

Remote code execution within Chrome's sandbox, potentially leading to data theft, cryptocurrency mining, or installation of malware.

🟢

If Mitigated

Limited impact with proper sandboxing, but still potential for data exfiltration or limited system access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious page) but no authentication. Sandbox escape adds complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 126.0.6478.182

Vendor Advisory: https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript to prevent exploitation, but will break most websites.

chrome://settings/content/javascript → Block

Use Site Isolation

all

Ensure site isolation is enabled for additional protection layers.

chrome://flags/#site-isolation-trial-opt-out → Disabled

🧯 If You Can't Patch

  • Use alternative browsers until Chrome can be updated
  • Implement network filtering to block suspicious websites and restrict internet access

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in About Google Chrome page. If version is below 126.0.6478.182, system is vulnerable.

Check Version:

google-chrome --version (Linux) or check chrome://version

Verify Fix Applied:

Verify Chrome version is 126.0.6478.182 or higher in About Google Chrome page.

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with V8-related errors
  • Unusual process creation from Chrome

Network Indicators:

  • Connections to known malicious domains serving exploit code
  • Unusual outbound traffic from Chrome processes

SIEM Query:

process_name:chrome.exe AND (event_id:1000 OR event_id:1001) AND description:*V8* OR process_name:chrome.exe AND parent_process NOT IN (explorer.exe, userinit.exe)

🔗 References

📤 Share & Export