CVE-2024-6999

4.3 MEDIUM

📋 TL;DR

This vulnerability in Google Chrome's FedCM (Federated Credential Management) implementation allows attackers to spoof UI elements through crafted HTML pages when users perform specific gestures. It affects Chrome users on all platforms who visit malicious websites. The attacker must convince users to interact with deceptive UI elements.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 127.0.6533.72
Operating Systems: Windows, macOS, Linux, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all standard Chrome installations; no special configuration required for exploitation.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could trick users into revealing sensitive information or performing unintended actions by displaying fake login prompts, permission dialogs, or other interface elements that appear legitimate.

🟠

Likely Case

Phishing attacks where users are tricked into entering credentials or granting permissions to malicious sites through spoofed UI elements.

🟢

If Mitigated

Minimal impact if users are trained to verify URLs and avoid suspicious sites, and if multi-factor authentication is used for sensitive accounts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction with specific UI gestures on a crafted HTML page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 127.0.6533.72

Vendor Advisory: https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click the three-dot menu. 3. Go to Help > About Google Chrome. 4. Chrome will automatically check for and install updates. 5. Click 'Relaunch' to restart Chrome.

🔧 Temporary Workarounds

Disable FedCM

all

Temporarily disable Federated Credential Management feature via Chrome flags

chrome://flags/#fedcm
Set to 'Disabled'

🧯 If You Can't Patch

  • Use alternative browsers until Chrome can be updated
  • Implement web filtering to block known malicious sites and restrict user browsing

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in Settings > About Chrome. If version is below 127.0.6533.72, system is vulnerable.

Check Version:

On command line: google-chrome --version (Linux) or 'C:\Program Files\Google\Chrome\Application\chrome.exe' --version (Windows)

Verify Fix Applied:

After update, verify Chrome version is 127.0.6533.72 or higher in Settings > About Chrome.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts from unexpected origins
  • Multiple failed login attempts followed by successful login from same IP

Network Indicators:

  • HTTP requests to known malicious domains hosting crafted HTML pages
  • Unusual traffic patterns to credential-related endpoints

SIEM Query:

source="chrome_audit_logs" AND (event_type="authentication" OR event_type="permission_grant") AND user_agent="*Chrome/12[0-6].*"

🔗 References

📤 Share & Export