Known Exploited Vulnerability
8.8
HIGH
CVE-2024-7965
Google Chromium V8 Inappropriate Implementation Vu - [Actively Exploited]
Description

Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

INFO

Published Date :

Aug. 21, 2024, 9:15 p.m.

Last Modified :

Aug. 29, 2024, 1 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

2.8
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Google Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action :

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Notes :

https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html

Public PoC/Exploit Available at Github

CVE-2024-7965 has a 2 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2024-7965 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Google chrome
1 Microsoft edge_chromium
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-7965.

URL Resource
https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html Release Notes
https://issues.chromium.org/issues/356196918 Permissions Required

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 2 weeks, 6 days ago
0 stars 0 fork 0 watcher
Born at : Dec. 7, 2023, 3:29 a.m. This repo has been linked 1 different CVEs too.

None

Updated: 2 weeks, 6 days ago
0 stars 0 fork 0 watcher
Born at : Jan. 14, 2023, 11:38 a.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-7965 vulnerability anywhere in the article.

  • Cybersecurity News
BadIIS Malware : 35+ IIS Servers Compromised in DragonRank Campaign

A recent report from Cisco Talos has exposed a new threat actor named DragonRank, a Chinese-speaking group specializing in SEO manipulation and cyberattacks. This group operates by exploiting vulnerab ... Read more

Published Date: Sep 15, 2024 (20 hours, 7 minutes ago)
  • TheCyberThrone
CISA KEV Update Part II – September 2024.

The US CISA added below vulnerabilities to the Known Exploited Vulnerability Catalog based on the evidence of active exploitationCVE-2024-40766 SonicWall SonicOS contains an improper access control vu ... Read more

Published Date: Sep 10, 2024 (6 days, 18 hours ago)
  • Cybersecurity News
ECDSA Vulnerability in YubiKey: What You Need to Know

OLYMPUS DIGITAL CAMERAIn a recent security advisory, Yubico disclosed a moderate vulnerability (CVE-2024-45678) affecting several of its hardware security devices, including the widely-used YubiKey 5 ... Read more

Published Date: Sep 05, 2024 (1 week, 4 days ago)
  • The Hacker News
RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span various ... Read more

Published Date: Sep 02, 2024 (2 weeks ago)
  • The Register
Check your IP cameras: There's a new Mirai botnet on the rise

in brief A series of IP cameras still used all over the world, despite being well past their end of life, have been exploited to create a new Mirai botnet. The vulnerability (CVSS 8.7, CVE-2024-7029) ... Read more

Published Date: Aug 31, 2024 (2 weeks, 2 days ago)
  • The Hacker News
North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

Rootkit / Threat Intelligence A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North Korean actors in a campaign designed to deliver the ... Read more

Published Date: Aug 31, 2024 (2 weeks, 2 days ago)
  • The Hacker News
Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

Cryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to conduct illicit crypto ... Read more

Published Date: Aug 30, 2024 (2 weeks, 3 days ago)
  • TheCyberThrone
CISA adds CVE-2024-7965 Chrome bug to its KEV catalog

The U.S. CISA added Google Chrome vulnerability to its Known Exploited Vulnerability Catalog following the mass exploitation in the wild.CVE-2024-7965; Google Chromium V8 contains an inappropriate imp ... Read more

Published Date: Aug 29, 2024 (2 weeks, 4 days ago)
  • The Hacker News
Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google Chrome browsers to infect mobile users with information-steali ... Read more

Published Date: Aug 29, 2024 (2 weeks, 4 days ago)
  • TheCyberThrone
APT-C-60 Exploits WPS Office Vulnerabilities

Security researchers from ESET have identified two vulnerabilities in WPS Office for Windows, widely exploited by the APT-C-60 cyberespionage group, which is aligned with South Korea.APT-C-60, known f ... Read more

Published Date: Aug 29, 2024 (2 weeks, 4 days ago)
  • The Hacker News
U.S. Agencies Warn of Iranian Hacking Group's Ongoing Ransomware Attacks

U.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and coordinating with affiliates to deliver ransomware. Th ... Read more

Published Date: Aug 29, 2024 (2 weeks, 4 days ago)
  • The Hacker News
Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks

A years-old high-severity flaw impacting AVTECH IP cameras has been weaponized by malicious actors as a zero-day to rope them into a botnet. CVE-2024-7029 (CVSS score: 8.7), the vulnerability in quest ... Read more

Published Date: Aug 29, 2024 (2 weeks, 4 days ago)
  • The Hacker News
Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability

Vulnerability / Data Security Fortra has addressed a critical security flaw impacting FileCatalyst Workflow that could be abused by a remote attacker to gain administrative access. The vulnerability, ... Read more

Published Date: Aug 28, 2024 (2 weeks, 5 days ago)
  • The Hacker News
APT-C-60 Group Exploit WPS Office Flaw to Deploy SpyGlace Backdoor

Cyber Attack / Vulnerability A South Korea-aligned cyber espionage has been linked to the zero-day exploitation of a now-patched critical remote code execution flaw in Kingsoft WPS Office to deploy a ... Read more

Published Date: Aug 28, 2024 (2 weeks, 5 days ago)
  • The Hacker News
BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave

The threat actors behind the BlackByte ransomware group have been observed likely exploiting a recently patched security flaw impacting VMware ESXi hypervisors, while also leveraging various vulnerabl ... Read more

Published Date: Aug 28, 2024 (2 weeks, 5 days ago)
  • The Hacker News
CISA Flags Critical Apache OFBiz Flaw Amid Active Exploitation Reports

Software Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw affecting the Apache OFBiz open-source enterprise resource ... Read more

Published Date: Aug 28, 2024 (2 weeks, 5 days ago)
  • The Hacker News
Critical WPML Plugin Flaw Exposes WordPress Sites to Remote Code Execution

WordPress Security / Website Protection A critical security flaw has been disclosed in the WPML WordPress multilingual plugin that could allow authenticated users to execute arbitrary code remotely un ... Read more

Published Date: Aug 28, 2024 (2 weeks, 5 days ago)
  • The Hacker News
macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users

Cyber Espionage / Malware Users of Chinese instant messaging apps like DingTalk and WeChat are the target of an Apple macOS version of a backdoor named HZ RAT. The artifacts "almost exactly replicate ... Read more

Published Date: Aug 27, 2024 (2 weeks, 6 days ago)
  • The Hacker News
Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors

The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zero-day exploitation of a recently disclosed high-severity security flaw impacting Ve ... Read more

Published Date: Aug 27, 2024 (2 weeks, 6 days ago)
  • The Cyber Express
Critical Chrome Zero-Day Vulnerability (CVE-2024-7965) Requires Immediate User Action

Google recently addressed a critical zero-day vulnerability in its Chrome browser, identified as CVE-2024-7965. This high-severity flaw, affecting versions of Chrome prior to 128.0.6613.84, has been a ... Read more

Published Date: Aug 27, 2024 (2 weeks, 6 days ago)
  • security.nl
Google meldt actief misbruik van V8-kwetsbaarheid in Chrome

Aanvallers maken actief misbruik van een kwetsbaarheid in Chrome waar op 21 augustus een update voor verscheen. Het beveiligingslek, aangeduid als CVE-2024-7965, bevindt zich in V8, de JavaScript-engi ... Read more

Published Date: Aug 27, 2024 (2 weeks, 6 days ago)
  • The Hacker News
Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation

Vulnerability / Browser Security Google has revealed that a security flaw that was patched as part of a software update rolled out last week to its Chrome browser has come under active exploitation in ... Read more

Published Date: Aug 27, 2024 (2 weeks, 6 days ago)
  • TheCyberThrone
CISA adds CV-2024-7971 to its KEV Catalog

The US CISA has added Google Chrome vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.CVE-2024-7971 Google Chromium V8 contains a type of confusion ... Read more

Published Date: Aug 27, 2024 (2 weeks, 6 days ago)
  • Cybersecurity News
Google Chrome Faces Double Blow with New Zero-Day Flaw Exploits: CVE-2024-7965 and CVE-2024-7971

In a significant update to its security advisory, Google has confirmed that CVE-2024-7965, a high-severity zero-day vulnerability in the Chrome browser, has been actively exploited in the wild. This r ... Read more

Published Date: Aug 27, 2024 (2 weeks, 6 days ago)
  • TheCyberThrone
Google addressed 10th Zeroday in Chrome CVE-2024-7965

Google has released a patch to address a new Chrome zero-day vulnerability that is actively exploited.The vulnerability tracked as CVE-2024-7965 with a CVSS score of 8.8 is an inappropriate implementa ... Read more

Published Date: Aug 27, 2024 (2 weeks, 6 days ago)
  • BleepingComputer
Google tags a tenth Chrome zero-day as exploited this year

Today, Google revealed that it patched the tenth zero-day exploited in the wild in 2024 by attackers or security researchers during hacking contests. Tracked as CVE-2024-7965 and reported by a securit ... Read more

Published Date: Aug 26, 2024 (2 weeks, 6 days ago)
  • The Hacker News
SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access

Vulnerability / Enterprise Security SonicWall has released security updates to address a critical flaw impacting its firewalls that, if successfully exploited, could grant malicious actors unauthorize ... Read more

Published Date: Aug 26, 2024 (3 weeks ago)
  • The Hacker News
Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms

Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of more than 20 vulnerabilities that could be exploited to tar ... Read more

Published Date: Aug 26, 2024 (3 weeks ago)
  • The Hacker News
Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

Software Security / Vulnerability Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to ac ... Read more

Published Date: Aug 26, 2024 (3 weeks ago)
  • The Hacker News
CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September

Vulnerability / Government Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a security flaw impacting Versa Director to its Known Exploited Vulnerabilities (KEV) ca ... Read more

Published Date: Aug 24, 2024 (3 weeks, 2 days ago)
  • The Hacker News
Focus on What Matters Most: Exposure Management and Your Attack Surface

Read the full article for key points from Intruder's VP of Product, Andy Hornegold's recent talk on exposure management. If you'd like to hear Andy's insights first-hand, watch Intruder's on-demand we ... Read more

Published Date: Aug 23, 2024 (3 weeks, 3 days ago)
  • The Hacker News
Hardcoded Credential Vulnerability Found in SolarWinds Web Help Desk

Vulnerability / Network Security SolarWinds has issued patches to address a new security flaw in its Web Help Desk (WHD) software that could allow remote unauthenticated users to gain unauthorized acc ... Read more

Published Date: Aug 22, 2024 (3 weeks, 4 days ago)
  • The Hacker News
Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System Control

Network Security / Zero-Day Details have emerged about a China-nexus threat group's exploitation of a recently disclosed, now-patched security flaw in Cisco switches as a zero-day to seize control of ... Read more

Published Date: Aug 22, 2024 (3 weeks, 4 days ago)
  • Help Net Security
New Chrome zero-day actively exploited, patch quickly! (CVE-2024-7971)

A new Chrome zero-day vulnerability (CVE-2024-7971) exploited by attackers in the wild has been fixed by Google. About CVE-2024-7971 CVE-2024-7971 is a high-severity vulnerability caused by a type con ... Read more

Published Date: Aug 22, 2024 (3 weeks, 4 days ago)
  • The Hacker News
Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

Browser Security / Vulnerability Google has rolled out security fixes to address a high-severity security flaw in its Chrome browser that it said has come under active exploitation in the wild. Tracke ... Read more

Published Date: Aug 22, 2024 (3 weeks, 4 days ago)
  • The Hacker News
Critical Flaw in WordPress LiteSpeed Cache Plugin Allows Hackers Admin Access

Website Security / Vulnerability Cybersecurity researchers have disclosed a critical security flaw in the LiteSpeed Cache plugin for WordPress that could permit unauthenticated users to gain administr ... Read more

Published Date: Aug 22, 2024 (3 weeks, 4 days ago)
  • The Hacker News
GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges

Enterprise Software / Vulnerability GitHub has released fixes to address a set of three security flaws impacting its Enterprise Server product, including one critical bug that could be abused to gain ... Read more

Published Date: Aug 22, 2024 (3 weeks, 4 days ago)
  • The Hacker News
New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining

Database Security / Cryptocurrency Cybersecurity researchers have unpacked a new malware strain dubbed PG_MEM that's designed to mine cryptocurrency after brute-forcing their way into PostgreSQL datab ... Read more

Published Date: Aug 22, 2024 (3 weeks, 4 days ago)
  • Cybersecurity News
Urgent Chrome Update: Active Zero-Day Exploit Detected (CVE-2024-7971)

Google has released an urgent Chrome update (version 128.0.6613.84/85) in response to an actively exploited zero-day vulnerability (CVE-2024-7971). This vulnerability, categorized as a type confusion ... Read more

Published Date: Aug 22, 2024 (3 weeks, 4 days ago)
  • The Hacker News
Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data

Software Security / Vulnerability Cybersecurity researchers have disclosed a critical security flaw impacting Microsoft's Copilot Studio that could be exploited to access sensitive information. Tracke ... Read more

Published Date: Aug 21, 2024 (3 weeks, 5 days ago)
  • The Hacker News
GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk

WordPress / Cybersecurity A maximum-severity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000 websites to remote code execution a ... Read more

Published Date: Aug 21, 2024 (3 weeks, 5 days ago)
  • Cybersecurity News
CVE-2024-7272: Critical Heap Overflow Vulnerability Discovered in FFmpeg, PoC Published

A critical security vulnerability, identified as CVE-2024-7272, has been uncovered in FFmpeg, the world’s leading multimedia framework renowned for its ability to decode, encode, and stream nearly any ... Read more

Published Date: Aug 21, 2024 (3 weeks, 5 days ago)
  • Cyber Security News
Apache DolphinScheduler Vulnerability Let Hackers Execute Remote Code

A critical vulnerability has been identified in Apache DolphinScheduler, a popular open-source workflow orchestration platform. This security flaw, designated as CVE-2024-43202, allows hackers to exec ... Read more

Published Date: Aug 20, 2024 (3 weeks, 6 days ago)
  • The Hacker News
Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor

Vulnerability / Threat Intelligence A previously undocumented backdoor named Msupedge has been put to use against a cyber attack targeting an unnamed university in Taiwan. "The most notable feature of ... Read more

Published Date: Aug 20, 2024 (3 weeks, 6 days ago)
  • The Hacker News
Anatomy of an Attack

In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the technologies designed to com ... Read more

Published Date: Aug 20, 2024 (3 weeks, 6 days ago)
  • The Hacker News
Researchers Uncover TLS Bootstrap Attack on Azure Kubernetes Clusters

Vulnerability / Container Security Cybersecurity researchers have disclosed a security flaw impacting Microsoft Azure Kubernetes Services that, if successfully exploited, could allow an attacker to es ... Read more

Published Date: Aug 20, 2024 (3 weeks, 6 days ago)
  • The Hacker News
CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks

Vulnerability / Ransomware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw impacting Jenkins to its Known Exploited Vulnerabilities (KEV) catalog, f ... Read more

Published Date: Aug 20, 2024 (3 weeks, 6 days ago)
  • Cybersecurity News
PoC Exploit for Windows 0-Day Flaws CVE-2024-38202 and CVE-2024-21302 Released

Researchers have published the technical details and proof-of-concept (PoC) exploit code for two critical zero-day vulnerabilities in Windows, tracked as CVE-2024-38202 and CVE-2024-21302. These vulne ... Read more

Published Date: Aug 20, 2024 (3 weeks, 6 days ago)

The following table lists the changes that have been made to the CVE-2024-7965 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Aug. 29, 2024

    Action Type Old Value New Value
    Added Vulnerability Name Google Chromium V8 Inappropriate Implementation Vulnerability
    Added Required Action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
    Added Due Date 2024-09-18
    Added Date Added 2024-08-28
  • Initial Analysis by [email protected]

    Aug. 26, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
    Changed Reference Type https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html No Types Assigned https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html Release Notes
    Changed Reference Type https://issues.chromium.org/issues/356196918 No Types Assigned https://issues.chromium.org/issues/356196918 Permissions Required
    Added CWE NIST CWE-787
    Added CPE Configuration OR *cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* versions up to (excluding) 128.0.6613.84
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Aug. 22, 2024

    Action Type Old Value New Value
    Added CWE CISA-ADP CWE-358
    Added CVSS V3.1 CISA-ADP AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE Received by [email protected]

    Aug. 21, 2024

    Action Type Old Value New Value
    Added Description Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    Added Reference Chrome https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html [No types assigned]
    Added Reference Chrome https://issues.chromium.org/issues/356196918 [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-7965 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-7965 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability