CVE-2024-7021

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to create fake autofill UI elements in Chrome that appear legitimate, tricking users into entering sensitive information. It affects Chrome users on Windows who haven't updated to version 124.0.6367.60 or later. The attack requires user interaction with a malicious webpage.

💻 Affected Systems

Products:
  • Google Chrome
Versions: All versions prior to 124.0.6367.60
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Chrome on Windows; other operating systems and browsers are not vulnerable.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into entering passwords, credit card details, or other sensitive information into attacker-controlled forms, leading to credential theft and financial fraud.

🟠

Likely Case

Phishing attacks become more convincing as attackers can mimic legitimate Chrome autofill prompts, increasing success rates for credential harvesting.

🟢

If Mitigated

With updated Chrome and user awareness training, the risk is minimal as users would see legitimate autofill behavior and be suspicious of unusual prompts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting a malicious HTML page and convincing users to visit it, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 124.0.6367.60

Vendor Advisory: https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click the three-dot menu > Help > About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the update.

🔧 Temporary Workarounds

Disable Autofill

all

Temporarily disable Chrome's autofill feature to prevent UI spoofing attacks.

chrome://settings/autofill

Use Chrome on Non-Windows OS

all

Switch to using Chrome on Linux or macOS, which are not affected by this vulnerability.

🧯 If You Can't Patch

  • Implement web filtering to block known malicious sites and restrict access to untrusted domains.
  • Educate users to be cautious of autofill prompts on unfamiliar websites and verify URLs before entering sensitive information.

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: if below 124.0.6367.60 on Windows, it is vulnerable.

Check Version:

chrome://version/

Verify Fix Applied:

Confirm Chrome version is 124.0.6367.60 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual autofill events from suspicious domains in Chrome logs or endpoint monitoring tools.

Network Indicators:

  • HTTP requests to domains hosting crafted HTML pages with autofill-related scripts.

SIEM Query:

source="chrome_logs" AND event="autofill_triggered" AND url CONTAINS "suspicious_domain"

🔗 References

📤 Share & Export