CVE-2024-7971
vulnerability analysis and mitigation

Overview

Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. The vulnerability, identified as CVE-2024-7971, was discovered on August 19, 2024, by Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC). This high-severity vulnerability affects Chromium-based browsers, including Google Chrome and Microsoft Edge (Chrome Release, NVD).

Technical details

CVE-2024-7971 is a type confusion vulnerability in the V8 JavaScript and WebAssembly engine. The vulnerability allows remote code execution (RCE) in the sandboxed Chromium renderer process. It received a CVSS v3.1 base score of 9.6 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). This is the third exploited V8 type confusion vulnerability patched in V8 this year, following CVE-2024-4947 and CVE-2024-5274 (Microsoft Security).

Impact

The vulnerability enables remote attackers to achieve remote code execution through heap corruption when users visit specially crafted HTML pages. When successfully exploited, it allows attackers to escape the browser sandbox and potentially gain full control of the affected system. The vulnerability has been actively exploited in the wild, particularly targeting organizations in the cryptocurrency sector (CISA KEV).

Mitigation and workarounds

Google released a fix in Chrome version 128.0.6613.84, and Microsoft Edge was updated to version 128.0.2739.42 to address the vulnerability. Users are strongly advised to update their browsers immediately. Additionally, organizations should implement Microsoft's recommended mitigations, including enabling tamper protection in Microsoft Defender for Endpoint, running EDR in block mode, and ensuring systems are updated with the latest security patches (Chrome Release).

Community reactions

Microsoft has directly notified targeted or compromised customers, providing them with important information to secure their environments. The United States government has assessed that North Korean actors like Citrine Sleet will likely continue targeting vulnerabilities of cryptocurrency technology firms to generate and launder funds to support the North Korean regime (Microsoft Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management