CVE-2024-7969

8.8 HIGH

📋 TL;DR

A type confusion vulnerability in Chrome's V8 JavaScript engine allows attackers to execute arbitrary code through heap corruption when users visit malicious websites. This affects all Chrome users on vulnerable versions, enabling remote code execution without user interaction beyond browsing.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 128.0.6613.113
Operating Systems: Windows, macOS, Linux, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default Chrome configurations are vulnerable. Chromium-based browsers like Edge, Brave, etc. may also be affected if using vulnerable V8 versions.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, allowing attackers to install malware, steal data, or pivot to other systems.

🟠

Likely Case

Drive-by compromise where visiting a malicious website leads to malware installation or credential theft.

🟢

If Mitigated

Limited impact if browser sandboxing works correctly, potentially only browser crash or limited data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Type confusion vulnerabilities in V8 are frequently exploited in the wild. While no public PoC exists, similar vulnerabilities have been actively exploited.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 128.0.6613.113 and later

Vendor Advisory: https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html

Restart Required: Yes

Instructions:

1. Open Chrome 2. Click three-dot menu → Help → About Google Chrome 3. Chrome will automatically check for and install updates 4. Click 'Relaunch' to restart with updated version

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript execution to prevent exploitation

chrome://settings/content/javascript → Block

Enable Site Isolation

all

Ensure site isolation is enabled for additional protection

chrome://flags/#site-isolation-trial-opt-out → Disabled

🧯 If You Can't Patch

  • Use alternative browsers until Chrome can be updated
  • Implement network filtering to block known malicious domains and restrict browsing to trusted sites only

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in About Google Chrome page. If version is below 128.0.6613.113, system is vulnerable.

Check Version:

google-chrome --version (Linux), "C:\Program Files\Google\Chrome\Application\chrome.exe" --version (Windows)

Verify Fix Applied:

Verify Chrome version is 128.0.6613.113 or higher in About Google Chrome page.

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with V8-related errors
  • Unexpected process spawns from Chrome
  • Memory access violation logs

Network Indicators:

  • Connections to suspicious domains followed by unusual outbound traffic
  • DNS requests for known exploit kit domains

SIEM Query:

source="chrome" AND (event_type="crash" OR process_name="chrome.exe") AND (message="V8" OR message="type confusion" OR message="heap corruption")

🔗 References

📤 Share & Export