Open Nav
Sign Up

Zero-Day Alert: Urgent Update Required for Chrome Due to New Actively Exploited Vulnerability(CVE-2024-0519)

Bar Refael

January 17, 2024

Google has urgently released updates for its Chrome browser to address four security issues, including a critical actively exploited zero-day flaw. The vulnerability, identified as CVE-2024-0519, is an out-of-bounds memory access issue in the V8 JavaScript and WebAssembly engine. This flaw poses a serious threat as it can be exploited to bypass security measures and execute code, potentially leading to system crashes and data breaches.

Details of the Vulnerability:

  • CVE-2024-0519: The vulnerability involves improper memory access in Chrome’s V8 engine. Exploitation can lead to heap corruption, allowing attackers to bypass ASLR and other protection mechanisms. This could result in unauthorized code execution or denial of service.
  • Reported: The issue was anonymously reported on January 11, 2024.
  • Affected Versions: Google Chrome versions prior to 120.0.6099.224.

Impact and Risks:

This zero-day flaw allows attackers to exploit heap corruption through a crafted HTML page, making it a high-risk vulnerability for any user of the affected Chrome versions. The exploitation of such vulnerabilities can lead to the compromise of sensitive information and system integrity.

Recommendations:

  • Immediate Update: Users are strongly advised to update their Chrome browser to version 120.0.6099.224/225 for Windows, 120.0.6099.234 for macOS, and 120.0.6099.224 for Linux.
  • Chromium-based Browsers: Users of browsers like Microsoft Edge, Brave, Opera, and Vivaldi, which are based on Chromium, should also apply updates as soon as they are available.

OP Innovate’s Advisory:

  • Vigilance: Continuously monitor systems for any signs of unusual activity or potential security breaches.
  • Security Best Practices: Maintain up-to-date software, use robust security solutions, and regularly review security protocols.

Conclusion:

CVE-2024-0519 represents the first actively exploited zero-day patched by Google in Chrome in 2024. Given the severity and active exploitation of this vulnerability, immediate action is required to ensure system security and integrity.

Stay informed and protected,

OP Innovate Cybersecurity Team.

Resources highlights

Cisco IOS and IOS XE SNMP Zero-Day Actively Exploited (CVE-2025-20352)

Cisco disclosed CVE-2025-20352, a stack overflow in the SNMP subsystem of IOS and IOS XE, now confirmed as actively exploited in the wild. Attackers can…

Read more >

CVE-2025-20352

SolarWinds Web Help Desk (WHD) Unauthenticated RCE Patch-Bypass (CVE-2025-26399)

SolarWinds released Web Help Desk 12.8.7 Hotfix 1 to fix CVE-2025-26399, an unauthenticated remote code execution flaw in the AjaxProxy component caused by unsafe deserialization.…

Read more >

CVE-2025-26399

SonicWall Cloud Backup Compromise & Ongoing SSLVPN Exploitation

Threat actors gained access to MySonicWall cloud backup preference files after brute-forcing the vendor’s portal. These files, although encrypted, contain sensitive configuration data such as…

Read more >

sonicwall cloud

Ongoing Supply-Chain Attack Targeting npm Packages (aka “Shai-Hulud”)

Beginning on September 14, 2025, and accelerating over the next two days, attackers launched a large-scale supply-chain attack against the npm ecosystem. The campaign injected…

Read more >

Shai-Hulud

FBI Advisory: UNC6040/UNC6395 Targeting Salesforce Environments

The FBI has issued a FLASH advisory detailing activity from the threat groups UNC6040 and UNC6395, who are actively conducting data theft and extortion campaigns…

Read more >

salesforce fbi advisory

CVE-2024-40766: SonicWall SSL VPN Flaw Actively Exploited by Ransomware Threat Actors

CVE-2024-40766 is a critical improper access control vulnerability in SonicWall SonicOS management access/SSLVPN. Successful exploitation enables unauthorized access and can, in some cases, crash the…

Read more >

CVE-2024-40766
Under Cyber Attack?

Fill out the form and we will contact you immediately.