CVE-2024-9959

Use After Free (CWE-416)

Published: Oct 15, 2024 / Updated: 35d ago

010
CVSS 8.8EPSS 0.04%High
CVE info copied to clipboard

Summary

Use after free vulnerability in DevTools in Google Chrome prior to version 130.0.6723.58 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted Chrome Extension. This vulnerability is classified as Medium severity by Chromium security standards.

Impact

This vulnerability could allow an attacker who has already compromised the renderer process to exploit heap corruption through a crafted Chrome Extension. The potential impacts include: 1. Arbitrary code execution with the privileges of the Chrome browser process. 2. High impact on confidentiality, integrity, and availability of the affected system. 3. The attack vector is network-based, requires low attack complexity, but does require user interaction. 4. Given the CVSS score of 8.8 (High), this vulnerability should be considered a priority for patching efforts. These attacks could manifest as: - Malicious Chrome extensions executing unauthorized code. - Potential data theft or manipulation within the browser environment. - Possible lateral movement or escalation of privileges if the attacker can leverage the browser's permissions.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability is fixed in Google Chrome version 130.0.6723.58 and later. It is crucial to update to this version or a newer one to mitigate the risk.

Mitigation

1. Update Google Chrome to version 130.0.6723.58 or later as soon as possible. 2. Implement network segmentation and strict access controls to limit potential attack vectors. 3. Educate users about the risks of installing untrusted Chrome Extensions. 4. Consider using browser isolation technologies to contain potential threats. 5. Regularly monitor and audit installed Chrome Extensions across the organization. 6. Implement a robust patch management process to ensure timely updates of Chrome across all systems. 7. Consider temporarily disabling Chrome Extensions in high-risk environments until patching is complete.

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (380705)

Oct 15, 2024 at 7:53 AM
First Article

Feedly found the first article mentioning CVE-2024-9959. See article

Oct 15, 2024 at 8:05 PM / Neowin News Feed for: Software
CVE Assignment

NVD published the first details for CVE-2024-9959

Oct 15, 2024 at 9:15 PM
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 15, 2024 at 9:21 PM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (209038)

Oct 15, 2024 at 11:15 PM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (209037)

Oct 15, 2024 at 11:15 PM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (209036)

Oct 15, 2024 at 11:15 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.7%)

Oct 16, 2024 at 9:58 AM
CVSS

A CVSS base score of 8.8 has been assigned.

Oct 16, 2024 at 8:40 PM / nvd
Static CVE Timeline Graph

Affected Systems

Google/chrome
+null more

Patches

Microsoft
+null more

References

MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution - PATCH NOW
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user.

News

Multiple vulnerabilities in Prisma Access Browser
A remote attacker can trick the victim into visiting a specially crafted web page, trigger a use-after-free error and gain access to sensitive information. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Fedora 41 : chromium (2024-3a6f9ab958)
Nessus Plugin ID 211343 with High Severity Synopsis The remote Fedora host is missing one or more security updates. Description The remote Fedora 41 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2024-3a6f9ab958 advisory. Update to 130.0.6723.58 * High CVE-2024-9954: Use after free in AI * Medium CVE-2024-9955: Use after free in Web Authentication * Medium CVE-2024-9956: Inappropriate implementation in Web Authentication * Medium CVE-2024-9957: Use after free in UI * Medium CVE-2024-9958: Inappropriate implementation in PictureInPicture * Medium CVE-2024-9959: Use after free in DevTools * Medium CVE-2024-9960: Use after free in Dawn * Medium CVE-2024-9961:
Patch Tuesday November 2024 - 3 Zero Days!
So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month. Of this months patches only 8 are critical and 88 important.
PAN-SA-2024-0016 Chromium: Monthly Vulnerability Updates (Severity: HIGH)
Product Confidentiality HIGH Product Integrity HIGH
Chromium: CVE-2024-9959 Use after free in DevTools
See 51 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI