
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability identified as CVE-2024-0814 was discovered in Google Chrome versions prior to 121.0.6167.85. The vulnerability involves incorrect security UI implementation in the Payments feature, which could allow remote attackers to potentially spoof security UI through a crafted HTML page. The issue was reported by Muneaki Nishimura (nishimunea) on July 11, 2023, and was assigned a Medium severity rating by Chromium security team (Chrome Release).
The vulnerability is classified as an Origin Validation Error (CWE-346) with a CVSS v3.1 Base Score of 6.5 (Medium). The CVSS vector string is CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N, indicating network accessibility, low attack complexity, no privileges required, user interaction required, unchanged scope, no impact on confidentiality, high impact on integrity, and no impact on availability (NVD).
The vulnerability could allow an attacker to spoof security UI elements in the Chrome browser's payment interface, potentially misleading users during payment transactions. This could lead to users being deceived about the security status or legitimacy of payment-related interfaces (Chrome Release).
Google has addressed this vulnerability in Chrome version 121.0.6167.85. Users are advised to update their Chrome browsers to this version or later. The fix has also been incorporated into various Linux distributions, including Fedora 38 and 39 (Fedora Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."