CVE-2021-37987
vulnerability analysis and mitigation

Overview

CVE-2021-37987 is a Use-after-free vulnerability discovered in the Network APIs of Google Chrome versions prior to 95.0.4638.54. The vulnerability was reported on May 8, 2021, and was officially patched in the Chrome stable channel update released on October 19, 2021. This security flaw affects Google Chrome browsers across Windows, Mac, and Linux operating systems (Chrome Release).

Technical details

The vulnerability is classified as a Use-after-free (CWE-416) issue in Chrome's Network APIs. It received a CVSS v3.1 base score of 8.8 (HIGH), with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The vulnerability allows potential heap corruption exploitation through a specially crafted HTML page (NVD).

Impact

The vulnerability could allow a remote attacker to potentially exploit heap corruption, which could lead to arbitrary code execution, information disclosure, or denial of service. Given the high CVSS score and the critical nature of browser network APIs, successful exploitation could give attackers significant control over affected systems (NVD).

Mitigation and workarounds

The vulnerability was patched in Chrome version 95.0.4638.54. Users and organizations are advised to update to this version or later. For Debian systems, the fix was included in version 97.0.4692.71-0.1~deb11u1 for the bullseye distribution (Debian Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management