Open Nav
Sign Up

New Chrome Zero-Day Vulnerability (CVE-2023-7024)

Chrome Zero-Day Vulnerability

Bar Refael

December 26, 2023

We at OP Innovate would like to bring to your immediate attention a critical security update regarding a newly identified vulnerability in the Google Chrome browser, referenced as CVE-2023-7024. This vulnerability has been actively exploited in the wild and demands urgent action.

Key Points of the Vulnerability:

  • Vulnerability Description: CVE-2023-7024 is a high-severity heap buffer overflow issue identified within the WebRTC framework used in Chrome. This flaw could lead to program crashes or arbitrary code execution on affected systems.
  • Discovery: The vulnerability was discovered and reported by Clément Lecigne and Vlad Stolyarov of Google’s Threat Analysis Group (TAG).
  • Exploitation in the Wild: Google has confirmed that this vulnerability has been actively exploited, making it the eighth Chrome zero-day patched in 2023.
  • Other Zero-Day Vulnerabilities: This year has seen several other zero-day vulnerabilities in Chrome, including CVE-2023-6345, CVE-2023-5217, and others, each with its own risk factors.
  • Impact on Cybersecurity: With over 26,000 vulnerabilities disclosed in 2023, this adds to a growing list of security challenges faced by users and organizations.

Recommended Actions:

  • Immediate Update: Users are urged to update their Chrome browsers to the latest versions (120.0.6099.129/130 for Windows and 120.0.6099.129 for Mac and Linux) as soon as possible.
  • Chromium-Based Browsers: Users of browsers based on Chromium (like Microsoft Edge, Brave, Opera, and Vivaldi) should also apply updates when available.

Importance of Timely Action:

  • The rapid response to such vulnerabilities is crucial to safeguarding your digital infrastructure against potential exploits.
  • Delay in updating could leave systems exposed to cyber-attacks, including remote code execution and data breaches.

OP Innovate’s Commitment:

  • We are closely monitoring the situation and will provide further updates as more information becomes available.
  • Our team is dedicated to assisting our customers in navigating these cybersecurity challenges effectively.

Please do not hesitate to reach out to us for any assistance or clarification regarding this update. Your digital safety and security are our top priority.

Stay safe and updated

Resources highlights

Docker Issues Patch for Critical Exploit in Docker Desktop: CVE-2025-9074

On August 20, 2025, Docker released an urgent patch for CVE-2025-9074, a critical Server-Side Request Forgery (SSRF) vulnerability (CVSS 9.3) affecting Docker Desktop for Windows…

Read more >

CVE-2025-9074

CVE-2025-48384: Git Submodule Path Flaw Exploited in the Wild

CVE-2025-48384 is a client-side Git vulnerability that lets a malicious repository abuse a mismatch in how Git reads vs. writes configuration values containing a trailing…

Read more >

CVE-2025-48384

CVE-2025-43300: Apple ImageIO Zero-Day Exploited in Targeted Attacks

Apple patched CVE-2025-43300, a zero-day in the ImageIO framework used system-wide to read/write many image formats. Opening or previewing a malicious image can corrupt memory…

Read more >

CVE-2025-43300

CVE-2025-57790: Commvault Path Traversal Vulnerability Leads to RCE

On August 19th, Commvault published advisory CV_2025_08_2 for a newly-discovered path traversal flaw in the Web Server component that allows remote attackers to perform unauthorized…

Read more >

CVE-2025-57790

CVE-2025-20265: Cisco Secure Firewall Management Center (FMC) RADIUS Pre-Auth RCE

A critical (CVSS 10.0)  input-handling flaw in the RADIUS authentication subsystem of Cisco Secure Firewall Management Center (FMC), tracked as CVE-2025-20265 allows unauthenticated remote code…

Read more >

CVE-2025-20265

5 Signs You’ve Outgrown Your Current Pentest Provider

As a CISO, CTO, or security leader, you understand the value of regular penetration testing. However, as your company scales and your security program matures,…

Read more >

5 signs PT provider
Under Cyber Attack?

Fill out the form and we will contact you immediately.