CVE-2024-7981

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to create deceptive UI elements in Google Chrome through crafted HTML pages, enabling UI spoofing attacks. It affects users running Chrome versions before 128.0.6613.84. The attack requires user interaction with malicious content.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 128.0.6613.84
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Chromium-based browsers may also be affected depending on their patch level.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could create convincing phishing interfaces that trick users into entering sensitive information or performing unintended actions, potentially leading to credential theft or malware installation.

🟠

Likely Case

Most exploitation would involve creating fake login prompts, permission dialogs, or other UI elements to trick users into clicking malicious elements or entering information.

🟢

If Mitigated

With proper user awareness training and browser security features enabled, users would be less likely to interact with suspicious UI elements, reducing the attack's effectiveness.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction with a malicious webpage. No authentication is needed to serve the crafted HTML.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 128.0.6613.84 and later

Vendor Advisory: https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click the three-dot menu. 3. Go to Help > About Google Chrome. 4. Chrome will automatically check for and apply updates. 5. Restart Chrome when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents execution of malicious scripts that could exploit the vulnerability

Use Content Security Policy

all

Implement strict CSP headers to restrict what content can load

🧯 If You Can't Patch

  • Deploy network filtering to block known malicious domains serving exploit content
  • Implement user awareness training about phishing and suspicious UI elements

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in Settings > About Chrome. If version is below 128.0.6613.84, the system is vulnerable.

Check Version:

google-chrome --version

Verify Fix Applied:

Confirm Chrome version is 128.0.6613.84 or higher in Settings > About Chrome.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user reports of suspicious browser dialogs or UI elements
  • Increased reports of phishing attempts

Network Indicators:

  • Traffic to domains hosting HTML pages with unusual view manipulation patterns

SIEM Query:

source="chrome_logs" AND (event="suspicious_dialog" OR event="unexpected_prompt")

🔗 References

📤 Share & Export