CVE-2024-2628
vulnerability analysis and mitigation

Overview

CVE-2024-2628 is a security vulnerability discovered in Google Chrome's Downloads feature affecting versions prior to 123.0.6312.58. The vulnerability was disclosed on March 19, 2024, and was reported by security researcher Ath3r1s on January 3, 2024. This vulnerability affects Google Chrome browser installations across Windows, Mac, and Linux platforms (Chrome Release).

Technical details

The vulnerability is classified as a Medium severity issue with a CVSS v3.1 base score of 4.3. The CVSS vector is AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N, indicating that it is network-accessible, requires low attack complexity, needs no privileges, but does require user interaction. The vulnerability stems from an inappropriate implementation in the Downloads component that could allow UI spoofing through a crafted URL (NVD).

Impact

When exploited, this vulnerability allows a remote attacker to perform UI spoofing via a crafted URL, potentially misleading users about the nature or source of downloaded content. The impact is limited to interface manipulation without direct system compromise (Chrome Release).

Mitigation and workarounds

The vulnerability has been patched in Chrome version 123.0.6312.58. Users are advised to update their Chrome browsers to this version or later to mitigate the risk. The fix has been distributed through the stable channel for Windows, Mac, and Linux platforms (Chrome Release).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management