Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4558: Use after free in Google Chrome

0
High
VulnerabilityCVE-2024-4558cvecve-2024-4558
Published: Tue May 07 2024 (05/07/2024, 19:02:22 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 11/04/2025, 16:52:41 UTC

Technical Analysis

CVE-2024-4558 is a use-after-free vulnerability identified in the ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome prior to version 124.0.6367.155. ANGLE is responsible for translating OpenGL ES calls to DirectX or Vulkan, facilitating graphics rendering in Chrome. The vulnerability arises when a use-after-free condition occurs, meaning that the program continues to use memory after it has been freed, leading to heap corruption. An attacker can exploit this flaw by delivering a crafted HTML page that triggers the vulnerability during rendering. This can result in arbitrary code execution within the context of the browser, compromising confidentiality, integrity, and availability of the user's system. The vulnerability requires no prior authentication or privileges but does require user interaction (visiting a malicious page). The CVSS v3.1 score of 7.5 indicates high severity, with attack vector being network-based, high attack complexity, no privileges required, and user interaction needed. Although no known exploits are currently reported in the wild, the potential for exploitation remains significant given Chrome's dominant market share. The vulnerability is classified under CWE-416 (Use After Free), a common and dangerous memory corruption issue. Google has addressed this vulnerability in Chrome version 124.0.6367.155, and users are strongly advised to update to this or later versions to mitigate the risk.

Potential Impact

The impact of CVE-2024-4558 on European organizations can be substantial due to the widespread use of Google Chrome across enterprises, government agencies, and critical infrastructure sectors. Successful exploitation can lead to arbitrary code execution, allowing attackers to execute malicious payloads, steal sensitive data, or disrupt services. This compromises confidentiality, integrity, and availability of affected systems. Given the vulnerability requires only user interaction and no authentication, phishing or drive-by download attacks could be effective vectors. European organizations handling sensitive personal data under GDPR may face regulatory and reputational risks if breaches occur. Additionally, sectors such as finance, healthcare, and public administration, which heavily rely on secure web browsing, are particularly vulnerable. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as threat actors often reverse-engineer patches to develop exploits. Therefore, the vulnerability poses a significant risk to European digital ecosystems if left unpatched.

Mitigation Recommendations

1. Immediate update of all Google Chrome installations to version 124.0.6367.155 or later to ensure the vulnerability is patched. 2. Implement enterprise-wide browser update policies that enforce automatic updates and prevent use of outdated versions. 3. Employ browser security features such as sandboxing, site isolation, and strict content security policies to limit the impact of potential exploitation. 4. Educate users on the risks of visiting untrusted websites and clicking on suspicious links to reduce the likelihood of triggering the vulnerability. 5. Use network-level protections such as web filtering and intrusion prevention systems to block access to known malicious sites. 6. Monitor browser crash logs and unusual behavior indicative of exploitation attempts. 7. For high-risk environments, consider deploying endpoint detection and response (EDR) solutions capable of detecting exploitation attempts related to memory corruption. 8. Coordinate with IT and security teams to ensure rapid deployment of patches and continuous vulnerability management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2024-05-06T18:32:23.603Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2dfef0ba78a050538c74

Added to database: 11/4/2025, 4:46:54 PM

Last enriched: 11/4/2025, 4:52:41 PM

Last updated: 12/20/2025, 5:13:07 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats