Specialists published Exploit code and detailed analysis zero day of Google Chrome.
POC EXTELL TAKS A TYPE Confusion error with the identifier cve-2024-5274 (CVSS: 8.8) in the V8 engine, which is used to process JavaScript in a browser. The problem arises due to the fact that the program incorrectly interprets one type of data as another, which can lead to failures, damage to data and even execution of an arbitrary code.
Initially, Google released the correction of vulnerability in May 2024, but the technical details were hidden to prevent the possibility of using error by attackers. The situation has changed after the researchers @mistymntncop and @buptsb published on Github Exploit code.
The presence of a POC code has both positive and negative sides. On the one hand, it is useful for IB specialists who can study vulnerability and develop more effective protective measures. On the other hand, the code can be used by hackers to create real exploits and conduct attacks.
This vulnerability was used in attacks on the government sites of Mongolia, which touched iOS users and Android, visiting infected sites. The attacks were part of a wider campaign, during which another critical vulnerability of Chrome-CVE-2024-4671 was also used. In both campaigns, attackers used exploits similar to those used by commercial companies Intellexa and NSO Group, engaged in the development of espionage programs.
Google has already released an update for Chrome – version 125.0.6422.112/13 for Windows and Mac and version 125.0.6422.112 for Linux. Users are strongly recommended to immediately update the browser to protect themselves from possible attacks.