Skip to main content

CVE-2024-0814: Incorrect security UI in Google Chrome

Medium
VulnerabilityCVE-2024-0814cvecve-2024-0814
Published: Tue Jan 23 2024 (01/23/2024, 23:53:00 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Incorrect security UI in Payments in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 07/08/2025, 19:43:37 UTC

Technical Analysis

CVE-2024-0814 is a security vulnerability identified in Google Chrome versions prior to 121.0.6167.85, specifically related to the Payments user interface (UI). The flaw involves an incorrect security UI implementation that allows a remote attacker to potentially spoof the security UI by crafting a malicious HTML page. This spoofing can mislead users into believing that a payment or security prompt is legitimate when it is not, thereby increasing the risk of phishing or fraudulent transactions. The vulnerability is classified under CWE-346, which pertains to improper verification of cryptographic signatures, indicating that the UI does not correctly verify or display security indicators. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact is primarily on integrity (I:H), with no direct impact on confidentiality or availability. No known exploits are currently reported in the wild, and no patch links were provided, but the issue is resolved in Chrome version 121.0.6167.85 and later. The vulnerability could be exploited by an attacker hosting a specially crafted webpage that tricks users into accepting fraudulent payment requests or security dialogs, potentially leading to financial fraud or unauthorized transactions. Since the attack requires user interaction, social engineering is a key component of exploitation. The flaw undermines user trust in Chrome's payment UI security indicators, which are critical for safe online transactions.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to businesses and users involved in online payments, e-commerce, and financial services. Attackers could exploit this flaw to conduct phishing attacks that appear to originate from legitimate payment prompts, potentially leading to fraudulent transactions or theft of payment credentials. This could result in financial losses, reputational damage, and regulatory scrutiny under GDPR and PSD2 regulations that mandate strong security controls for payment processing. Organizations relying on Chrome for their web-based payment interfaces or customer interactions may see increased risk of customer fraud and trust erosion. Additionally, employees using vulnerable Chrome versions could be targeted to gain unauthorized access to corporate financial resources or sensitive transaction data. Although the vulnerability does not directly compromise confidentiality or availability, the integrity impact is critical in the context of payments, where trust in UI authenticity is paramount. The medium severity rating reflects the need for prompt patching and user awareness to mitigate social engineering risks.

Mitigation Recommendations

European organizations should ensure that all instances of Google Chrome are updated to version 121.0.6167.85 or later, where this vulnerability is fixed. Automated patch management systems should be employed to enforce timely updates across all user endpoints. Additionally, organizations should educate users about the risks of interacting with unexpected payment prompts and encourage verification of payment requests through out-of-band channels. Web filtering solutions can be configured to block or flag suspicious or untrusted websites that may host malicious HTML pages exploiting this vulnerability. For critical financial applications, consider implementing multi-factor authentication and transaction verification mechanisms independent of browser UI cues to reduce reliance on browser security indicators. Security teams should monitor for phishing campaigns that leverage spoofed payment UIs and incorporate this vulnerability into threat intelligence feeds. Finally, organizations should review their incident response plans to address potential fraud incidents stemming from UI spoofing attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2024-01-23T00:47:27.090Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c098182aa0cae2b3b70f

Added to database: 5/30/2025, 2:28:40 PM

Last enriched: 7/8/2025, 7:43:37 PM

Last updated: 7/31/2025, 1:29:08 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats