January 2, 2024

CVE-2023-7024

A mobile phone with suspicious security imagery on the screen

Lookout Coverage and Recommendation for Admins

To ensure your devices are protected, Lookout admins should take the following steps in their Lookout console:

  • Enable the Application Vulnerability policy, which will detect when a vulnerable app version is on the device. Since there are known exploits, we suggest you set the severity to high and block user access to work data until they update the app. 
  • Lookout will publish coverage for this vulnerability on January 4th, 2024 under the family name MultiApp-CVE-2023-7024, after which the alerts will be generated based on the admin's risk, response and escalation setup. Any device with vulnerable versions of Chrome (at or below 120.0.6099.143) or Edge (at or below 120.0.2210.90) will receive an alert if detected after that date. 
  • Enable Lookout Phishing & Content Protection (PCP) to protect mobile users from malicious phishing campaigns that are built to exploit these vulnerabilities in order to phish credentials or deliver malicious apps to the device. 

Overview 

Google recently disclosed a critical vulnerability in Chromium, which is the open-source web browser project that they maintain, that adversely affects both Google Chrome and Microsoft Edge browsers across desktop and mobile devices. The vulnerability, which is classified as highly critical with a CVSS score of 8.8/10, could enable an attacker to execute code remotely on the device and infect with malware or steal sensitive data. 

The vulnerability itself exists in the WebRTC, which stands for Web Real-Time Communications. WebRTC is an open-source project that enables developers to build real-time voice, text, and video communication capabilities between web browsers and the devices they run on. A remote attacker could potentially exploit heap corruption, which is a memory function, to carry out an attack on devices with vulnerable versions of Chrome and Edge.  

Lookout Analysis

To understand the severity of this vulnerability, it’s important to know what heap memory corruption is. Across programming languages, a heap is a special block of memory that the operating system will set aside for a particular application to hold its memory in. When the heap is corrupted, intentionally or unintentionally, it can lead to application crashes, data loss, and security vulnerabilities. 

The most likely way for an attacker to exploit this vulnerability would be to send a maliciously crafted webpage, which makes sense since the vulnerability exists in the device’s web browser. Since this needs to be delivered to mobile device users, the attacker would send a message over SMS, email, a third-party messaging platform, or any mobile app that has a messaging feature. That message would contain a link to the malicious webpage, and with some simple social engineering the attacker could convince the victim to tap the link and kick off the exploit. 

Finally, it’s important to note that mobile device management (MDM) solutions would not detect this type of attack. While MDMs are useful for managing which apps are on a device and enforcing basic device security measures, they cannot detect phishing links or malicious code being loaded onto the device.

Authors

Lookout

Cloud & Endpoint Security

Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves.

Platform(s) Affected
Android
Threat Type
Vulnerability
Threat Type
Phishing
Entry Type
Threat Guidances
Platform(s) Affected
Android
Vulnerability
Phishing
Threat Guidances
A woman using her phone and laptop on a train ride.

Lookout Mobile Endpoint Security

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

Advanced mobile Endpoint Detection & Response powered by data from 185M+ apps and 200M+ devices on iOS, Android, ChromeOS.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell