Open Nav
Sign Up

Zero-Day Alert: Urgent Update Required for Chrome Due to New Actively Exploited Vulnerability(CVE-2024-0519)

Bar Refael

January 17, 2024

Google has urgently released updates for its Chrome browser to address four security issues, including a critical actively exploited zero-day flaw. The vulnerability, identified as CVE-2024-0519, is an out-of-bounds memory access issue in the V8 JavaScript and WebAssembly engine. This flaw poses a serious threat as it can be exploited to bypass security measures and execute code, potentially leading to system crashes and data breaches.

Details of the Vulnerability:

  • CVE-2024-0519: The vulnerability involves improper memory access in Chrome’s V8 engine. Exploitation can lead to heap corruption, allowing attackers to bypass ASLR and other protection mechanisms. This could result in unauthorized code execution or denial of service.
  • Reported: The issue was anonymously reported on January 11, 2024.
  • Affected Versions: Google Chrome versions prior to 120.0.6099.224.

Impact and Risks:

This zero-day flaw allows attackers to exploit heap corruption through a crafted HTML page, making it a high-risk vulnerability for any user of the affected Chrome versions. The exploitation of such vulnerabilities can lead to the compromise of sensitive information and system integrity.

Recommendations:

  • Immediate Update: Users are strongly advised to update their Chrome browser to version 120.0.6099.224/225 for Windows, 120.0.6099.234 for macOS, and 120.0.6099.224 for Linux.
  • Chromium-based Browsers: Users of browsers like Microsoft Edge, Brave, Opera, and Vivaldi, which are based on Chromium, should also apply updates as soon as they are available.

OP Innovate’s Advisory:

  • Vigilance: Continuously monitor systems for any signs of unusual activity or potential security breaches.
  • Security Best Practices: Maintain up-to-date software, use robust security solutions, and regularly review security protocols.

Conclusion:

CVE-2024-0519 represents the first actively exploited zero-day patched by Google in Chrome in 2024. Given the severity and active exploitation of this vulnerability, immediate action is required to ensure system security and integrity.

Stay informed and protected,

OP Innovate Cybersecurity Team.

Resources highlights

MongoDB Zlib Protocol Vulnerability: CVE-2025-14847

MongoDB has issued an urgent security advisory warning administrators to patch a high-severity vulnerability affecting MongoDB Server deployments. The vulnerability, tracked as CVE-2025-14847, stems from…

Read more >

CVE-2025-14847

Critical n8n Workflow Automation RCE: CVE-2025-68613

A critical remote code execution vulnerability has been disclosed in the n8n workflow automation platform that could allow attackers to execute arbitrary code on affected…

Read more >

CVE-2025-68613

WatchGuard Firebox RCE Actively Exploited in the Wild: CVE-2025-14733

WatchGuard has disclosed a critical remote code execution (RCE) vulnerability affecting Firebox firewall appliances running the Fireware operating system. The vulnerability, tracked as CVE-2025-14733, is…

Read more >

CVE-2025-14733

SonicWall SMA 1000 Privilege Escalation: CVE-2025-40602

Threat actors are actively exploiting a privilege escalation vulnerability affecting SonicWall Secure Mobile Access (SMA) 1000 series appliances. The vulnerability, tracked as CVE-2025-40602, stems from…

Read more >

CVE-2025-40602

Active Exploitation of Fortinet FortiCloud SSO Authentication Bypass (CVE-2025-59718 & CVE-2025-59719)

Threat actors are actively exploiting two critical authentication bypass vulnerabilities in Fortinet products by abusing FortiCloud SSO functionality. The flaws, tracked as CVE-2025-59718 & CVE-2025-59719…

Read more >

CVE-2025-59718 & CVE-2025-59719

Apple WebKit Zero-Day Exploited in Targeted Attacks (CVE-2025-14174)

Apple has released emergency security updates to address CVE-2025-14174, a zero-day vulnerability in WebKit that has been actively exploited in the wild as part of…

Read more >

CVE-2025-14174
Under Cyber Attack?

Fill out the form and we will contact you immediately.