August 29, 2024

CVE-2024-7971

A smartphone appears vulnerable with cracks and glitches to symbolize its compromised state.

Lookout Coverage and Recommendation for Admins

To ensure your devices are protected, Lookout admins should take the following steps in their Lookout console:

  • Enable the Application Vulnerability policy, which will detect when a vulnerable app version is on the device. Since there are known exploits, we suggest you set the severity to high and block user access to work data until they update the app. 
  • Lookout will publish the coverage on September 5th, 2024 after which the alerts will be generated based on the admin's risk, response and escalation setup. Any device with vulnerable versions of Chrome (below the reported fixed version of 128.0.6613.88) will receive an alert if detected after that date. 
  • Enable Lookout Phishing & Content Protection (PCP) to protect mobile users from malicious phishing campaigns that are built to exploit these vulnerabilities in order to phish credentials or deliver malicious apps to the device.

Overview 

Researchers at Microsoft recently discovered and reported a new vulnerability in Google’s Chrome browser, which Google has acknowledged and released a patch for. Tracked as CVE-2024-7971, this vulnerability exists in the V8 Javascript and WebAssembly engine in Chrome. Researchers acknowledged that they are aware of an exploit for this vulnerability that exists in the wild, though they did not describe the nature of the known exploit. 

NIST has given this vulnerability a based score of 8.8/10, which is very high because of the fact that there is a known exploit that attackers could leverage against vulnerable users. In addition, CISA has assigned a required date of September 16th, 2024 for government agencies to ensure their devices are up to date. 

Lookout Analysis

CVE-2024-7971 has been described as a type confusion bug in the underlying Javascript and WebAssembly engine. When type confusions occur in the underlying engines, it’s typically the result of code performing its expected operations on an object that is not of the class expected by the code. This confusion can be manipulated and is exploitable by threat actors. 

Vulnerabilities like this can have outsized impact on mobile fleets. Since Chrome is by far the most widely-used mobile web browser with roughly 65% market share, it’s extremely unlikely for an enterprise organization to not have users who are at risk. Successfully exploiting vulnerabilities like this often grant the attacker access to the same permissions that Chrome has. It’s also important to note that this is the tenth zero-day that has been discovered in Chrome this year, which demonstrates the importance of keeping apps up to date.

Authors

Lookout

Cloud & Endpoint Security

Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves.

Threat Type
Vulnerability
Platform(s) Affected
All Platforms
Entry Type
Threat Guidances
Platform(s) Affected
Vulnerability
All Platforms
Threat Guidances
A woman using her phone and laptop on a train ride.

Lookout Mobile Endpoint Security

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

Advanced mobile Endpoint Detection & Response powered by data from 185M+ apps and 200M+ devices on iOS, Android, ChromeOS.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell