Google Chrome V8 Heap Corruption via Crafted HTML before 128.0.6613.84
CVE-2024-7965 Published on August 21, 2024
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Known Exploited Vulnerability
This Google Chromium V8 Inappropriate Implementation Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Google Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
The following remediation steps are recommended / required by September 18, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2024-7965 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Improperly Implemented Security Check for Standard
The software does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.
Products Associated with CVE-2024-7965
stack.watch emails you whenever new vulnerabilities are published in Google Chrome or Microsoft Edge Chromium. Just hit a watch button to start following.
Affected Versions
Google Chrome:- Version 128.0.6613.84 and below 128.0.6613.84 is affected.
- Before 128.0.6613.84 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.