Open Nav
Sign Up

Zero-Day Alert: Urgent Update Required for Chrome Due to New Actively Exploited Vulnerability(CVE-2024-0519)

Bar Refael

January 17, 2024

Google has urgently released updates for its Chrome browser to address four security issues, including a critical actively exploited zero-day flaw. The vulnerability, identified as CVE-2024-0519, is an out-of-bounds memory access issue in the V8 JavaScript and WebAssembly engine. This flaw poses a serious threat as it can be exploited to bypass security measures and execute code, potentially leading to system crashes and data breaches.

Details of the Vulnerability:

  • CVE-2024-0519: The vulnerability involves improper memory access in Chrome’s V8 engine. Exploitation can lead to heap corruption, allowing attackers to bypass ASLR and other protection mechanisms. This could result in unauthorized code execution or denial of service.
  • Reported: The issue was anonymously reported on January 11, 2024.
  • Affected Versions: Google Chrome versions prior to 120.0.6099.224.

Impact and Risks:

This zero-day flaw allows attackers to exploit heap corruption through a crafted HTML page, making it a high-risk vulnerability for any user of the affected Chrome versions. The exploitation of such vulnerabilities can lead to the compromise of sensitive information and system integrity.

Recommendations:

  • Immediate Update: Users are strongly advised to update their Chrome browser to version 120.0.6099.224/225 for Windows, 120.0.6099.234 for macOS, and 120.0.6099.224 for Linux.
  • Chromium-based Browsers: Users of browsers like Microsoft Edge, Brave, Opera, and Vivaldi, which are based on Chromium, should also apply updates as soon as they are available.

OP Innovate’s Advisory:

  • Vigilance: Continuously monitor systems for any signs of unusual activity or potential security breaches.
  • Security Best Practices: Maintain up-to-date software, use robust security solutions, and regularly review security protocols.

Conclusion:

CVE-2024-0519 represents the first actively exploited zero-day patched by Google in Chrome in 2024. Given the severity and active exploitation of this vulnerability, immediate action is required to ensure system security and integrity.

Stay informed and protected,

OP Innovate Cybersecurity Team.

Resources highlights

Critical Zero-Day in Samsung Galaxy Devices: CVE-2025-21042

A newly disclosed zero-day vulnerability in Samsung Galaxy smartphones has been actively exploited in the wild to deploy a sophisticated Android spyware framework known as…

Read more >

CVE-2025-21042

Critical RCE in CentOS Web Panel (CVE-2025-48703)

CVE-2025-48703 is a critical unauthenticated remote-code-execution (OS command injection) vulnerability in Control Web Panel (CWP / CentOS Web Panel) that allows attackers to inject shell…

Read more >

CVE-2025-48703

Actively Exploited Critical Vulnerability in Post SMTP Plugin for WordPress: CVE-2025-11833

A critical vulnerability (CVE-2025-11833) in the widely used Post SMTP WordPress plugin is being actively exploited to hijack administrator accounts and gain full control of…

Read more >

CVE-2025-11833

Malicious npm Packages Target Developers with Multi-OS Info-Stealer Payloads

A new software supply-chain attack has been uncovered involving ten malicious npm packages designed to steal developer credentials across Windows, macOS, and Linux systems. These…

Read more >

malicious npm packages

Cybersecurity Budgeting for 2026: Getting More Value from Every Dollar

As organizations close the books on 2025, cybersecurity leaders face a familiar dilemma: rising threats, growing expectations and shrinking budgets . Economic uncertainty has tightened…

Read more >

budgeting plan 2026

CVE-2025-59287: WSUS Remote Code Execution

CVE-2025-59287 is a critical remote code execution (RCE) vulnerability in the Windows Server Update Services (WSUS) role. An attacker who can reach a WSUS server…

Read more >

CVE-2025-59287
Under Cyber Attack?

Fill out the form and we will contact you immediately.