Severe Atlassian Vulnerability Exploited to Install Linux Version of Cerber Ransomware – Active IOCs
April 18, 2024Cybercriminals Exploit Fortinet Vulnerability to Deploy ScreenConnect and Metasploit – Active IOCs
April 18, 2024Severe Atlassian Vulnerability Exploited to Install Linux Version of Cerber Ransomware – Active IOCs
April 18, 2024Cybercriminals Exploit Fortinet Vulnerability to Deploy ScreenConnect and Metasploit – Active IOCs
April 18, 2024Severity
High
Analysis Summary
CVE-2024-3847 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient policy enforcement in WebUI. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2024-3846 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Prompts. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2024-3845 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Network. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2024-3844 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Extensions. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2024-3843 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient data validation in Downloads. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2024-3841 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient data validation in Browser Switcher. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2024-3840 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient policy enforcement in Site Isolation. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2024-3839 CVSS:6.5
Google Chrome could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in Fonts. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to obtain sensitive information.
CVE-2024-3838 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Autofill. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2024-3837 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in QUIC. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-3834 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Downloads. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-3833 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by object corruption in WebAssembly. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-3832 CVSS:8.8
Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by object corruption in V8. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
Impact
- Security Bypass
- Information Disclosure
- Gain Access
Indicators of Compromise
CVE
- CVE-2024-3847
- CVE-2024-3846
- CVE-2024-3845
- CVE-2024-3844
- CVE-2024-3843
- CVE-2024-3841
- CVE-2024-3840
- CVE-2024-3839
- CVE-2024-3838
- CVE-2024-3837
- CVE-2024-3834
- CVE-2024-3833
- CVE-2024-3832
Affected Vendors
Affected Products
- Google Chrome 124.0
Remediation
Upgrade to the latest version of Google Chrome, available from the Google Chrome Releases Website.