Skip to main content

CVE-2024-0812: Inappropriate implementation in Google Chrome

High
VulnerabilityCVE-2024-0812cvecve-2024-0812
Published: Tue Jan 23 2024 (01/23/2024, 23:52:59 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in Accessibility in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 07/08/2025, 19:43:11 UTC

Technical Analysis

CVE-2024-0812 is a high-severity vulnerability identified in the Accessibility implementation of Google Chrome versions prior to 121.0.6167.85. The flaw arises from an inappropriate implementation within the Accessibility component, which can be triggered by a remote attacker through a crafted HTML page. Exploiting this vulnerability can lead to object corruption, potentially allowing the attacker to execute arbitrary code or cause a denial of service. The vulnerability is remotely exploitable over the network without requiring privileges, but it does require user interaction, such as visiting a malicious web page. The CVSS 3.1 base score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, with an attack vector of network, low attack complexity, no privileges required, and user interaction needed. The scope is unchanged, meaning the vulnerability affects only the Chrome process itself. Although no known exploits are currently reported in the wild, the high severity and ease of exploitation make it a significant threat. The vulnerability specifically targets the Accessibility feature, which is a critical component for users relying on assistive technologies, potentially increasing the risk for users with disabilities if exploited. The lack of publicly available patches at the time of reporting underscores the urgency for users and organizations to update promptly once fixes are released.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the widespread use of Google Chrome as a primary web browser across enterprises, government agencies, and critical infrastructure sectors. Exploitation could lead to unauthorized code execution, data breaches, or service disruptions, impacting confidentiality, integrity, and availability of sensitive information and services. Organizations with employees or clients using assistive technologies may face heightened risk, as the vulnerability resides in the Accessibility implementation. The potential for remote exploitation via crafted web content means that phishing campaigns or malicious websites could serve as vectors, increasing the attack surface. Given the interconnected nature of European digital infrastructure and regulatory requirements such as GDPR, a successful exploit could result in significant operational, financial, and reputational damage, as well as regulatory penalties. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score indicates that attackers may prioritize this vulnerability once exploit code becomes available.

Mitigation Recommendations

European organizations should prioritize updating Google Chrome to version 121.0.6167.85 or later immediately upon release of the patch. Until patches are available, organizations should implement network-level protections such as web filtering to block access to untrusted or suspicious websites that could host crafted HTML pages exploiting this vulnerability. Employing endpoint protection solutions capable of detecting anomalous browser behavior may help mitigate exploitation attempts. Security awareness training should emphasize the risks of interacting with unknown or suspicious web content, particularly for users relying on assistive technologies. Organizations should also monitor threat intelligence feeds for any emerging exploit code or attack campaigns targeting this vulnerability. Additionally, applying the principle of least privilege by restricting browser permissions and disabling unnecessary accessibility features where feasible can reduce the attack surface. Regular vulnerability scanning and penetration testing should include checks for outdated Chrome versions to ensure compliance with patching policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2024-01-23T00:47:26.902Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c098182aa0cae2b3b70d

Added to database: 5/30/2025, 2:28:40 PM

Last enriched: 7/8/2025, 7:43:11 PM

Last updated: 7/31/2025, 2:36:29 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats