CVE-2024-7005

4.3 MEDIUM

📋 TL;DR

This vulnerability in Google Chrome's Safe Browsing feature allows attackers to bypass discretionary access controls by tricking users into performing specific UI gestures with malicious files. It affects Chrome users on all platforms who haven't updated to version 127.0.6533.72 or later. The attack requires user interaction and social engineering to succeed.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 127.0.6533.72
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Requires user interaction with malicious files.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could bypass file system security controls to access or modify protected files, potentially leading to data theft or system compromise.

🟠

Likely Case

Limited file access bypass requiring specific user interaction, most likely used in targeted attacks against specific individuals.

🟢

If Mitigated

No impact if users don't interact with malicious files or if Chrome is fully updated.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: LOW with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires convincing users to perform specific UI gestures with malicious files, adding social engineering complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 127.0.6533.72

Vendor Advisory: https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html

Restart Required: Yes

Instructions:

1. Open Chrome 2. Click three-dot menu → Help → About Google Chrome 3. Chrome will automatically check for and install updates 4. Click 'Relaunch' to restart with the patched version

🔧 Temporary Workarounds

Disable automatic file downloads

all

Configure Chrome to ask where to save files instead of automatically downloading

chrome://settings/content/automaticDownloads → Toggle off

Enable Enhanced Safe Browsing

all

Provides additional protection against malicious files and websites

chrome://settings/security → Enable Enhanced protection

🧯 If You Can't Patch

  • Use alternative browsers until Chrome can be updated
  • Implement application whitelisting to restrict which files users can execute

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in Settings → About Chrome. If version is below 127.0.6533.72, system is vulnerable.

Check Version:

chrome://version/ (on Chrome) or google-chrome --version (command line)

Verify Fix Applied:

Confirm Chrome version is 127.0.6533.72 or higher in Settings → About Chrome.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from Chrome processes
  • Multiple failed file access attempts

Network Indicators:

  • Downloads from untrusted sources followed by unusual file system activity

SIEM Query:

process_name:"chrome.exe" AND (event_type:"file_access" OR event_type:"process_creation") AND target_file_path CONTAINS sensitive_directories

🔗 References

📤 Share & Export