CVE-2024-7003

4.3 MEDIUM

📋 TL;DR

This vulnerability in Google Chrome's FedCM (Federated Credential Management) implementation allows attackers to spoof UI elements through specific user gestures. Users who visit malicious websites and perform certain UI interactions are affected. The attack requires user interaction and has low security severity.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 127.0.6533.72
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects browsers with FedCM enabled (default in Chrome). Requires user interaction with specific UI gestures.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trick users into revealing sensitive information by spoofing legitimate authentication dialogs or consent prompts.

🟠

Likely Case

Limited phishing attempts where attackers mimic legitimate FedCM prompts to gather user data or trick users into unwanted actions.

🟢

If Mitigated

Minimal impact with updated Chrome versions and user awareness about suspicious UI interactions.

🌐 Internet-Facing: LOW
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires convincing users to perform specific UI gestures on crafted HTML pages. No authentication needed to initiate attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 127.0.6533.72 and later

Vendor Advisory: https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html

Restart Required: Yes

Instructions:

1. Open Chrome and click the three-dot menu
2. Go to Help > About Google Chrome
3. Chrome will automatically check for and apply updates
4. Click 'Relaunch' to restart Chrome with the update

🔧 Temporary Workarounds

Disable FedCM

all

Temporarily disable Federated Credential Management feature

chrome://flags/#fedcm
Set 'Federated Credential Management' to Disabled

Use Incognito Mode

all

FedCM is disabled in Incognito mode by default

🧯 If You Can't Patch

  • Educate users about not performing unexpected UI gestures on unfamiliar websites
  • Implement web filtering to block known malicious sites

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in Settings > About Chrome. If version is below 127.0.6533.72, system is vulnerable.

Check Version:

On Windows: chrome://version/ | On Linux: google-chrome --version | On macOS: /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version

Verify Fix Applied:

Confirm Chrome version is 127.0.6533.72 or higher in Settings > About Chrome.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FedCM API calls from unfamiliar domains
  • Multiple failed authentication attempts through FedCM

Network Indicators:

  • Requests to unfamiliar domains using FedCM endpoints
  • Unusual patterns in credential management API calls

SIEM Query:

source="chrome_audit_logs" AND (event="fedcm_request" AND domain NOT IN ["trusted_domains"])

🔗 References

📤 Share & Export