Open Nav
Sign Up

Zero-Day Alert: Urgent Update Required for Chrome Due to New Actively Exploited Vulnerability(CVE-2024-0519)

Bar Refael

January 17, 2024

Google has urgently released updates for its Chrome browser to address four security issues, including a critical actively exploited zero-day flaw. The vulnerability, identified as CVE-2024-0519, is an out-of-bounds memory access issue in the V8 JavaScript and WebAssembly engine. This flaw poses a serious threat as it can be exploited to bypass security measures and execute code, potentially leading to system crashes and data breaches.

Details of the Vulnerability:

  • CVE-2024-0519: The vulnerability involves improper memory access in Chrome’s V8 engine. Exploitation can lead to heap corruption, allowing attackers to bypass ASLR and other protection mechanisms. This could result in unauthorized code execution or denial of service.
  • Reported: The issue was anonymously reported on January 11, 2024.
  • Affected Versions: Google Chrome versions prior to 120.0.6099.224.

Impact and Risks:

This zero-day flaw allows attackers to exploit heap corruption through a crafted HTML page, making it a high-risk vulnerability for any user of the affected Chrome versions. The exploitation of such vulnerabilities can lead to the compromise of sensitive information and system integrity.

Recommendations:

  • Immediate Update: Users are strongly advised to update their Chrome browser to version 120.0.6099.224/225 for Windows, 120.0.6099.234 for macOS, and 120.0.6099.224 for Linux.
  • Chromium-based Browsers: Users of browsers like Microsoft Edge, Brave, Opera, and Vivaldi, which are based on Chromium, should also apply updates as soon as they are available.

OP Innovate’s Advisory:

  • Vigilance: Continuously monitor systems for any signs of unusual activity or potential security breaches.
  • Security Best Practices: Maintain up-to-date software, use robust security solutions, and regularly review security protocols.

Conclusion:

CVE-2024-0519 represents the first actively exploited zero-day patched by Google in Chrome in 2024. Given the severity and active exploitation of this vulnerability, immediate action is required to ensure system security and integrity.

Stay informed and protected,

OP Innovate Cybersecurity Team.

Resources highlights

New Linux Vulnerabilities (CVE-2025-6018 & CVE-2025-6019) Enable Full Root Access in Seconds

Security researchers have uncovered a critical privilege escalation chain in major Linux distributions that allows any local user with a session (SSH or GUI) to…

Read more >

CVE-2025-6018, CVE-2025-6019

Zero to Hero: How Our Red Team Turned a Sticky Note Into Full Cloud Compromise

“The weakest link in your security chain might be sitting right on your desk.” At OP Innovate, our CREST-certified red team is trained to think…

Read more >

OP Innovate Red Team

One-Third of All Grafana Instances Vulnerable to XSS (CVE-2025-4123)

Over 46,000 internet-facing Grafana servers (≈36 % of those online) are still running versions susceptible to CVE-2025-4123, a high-severity open-redirect that chains into stored cross-site…

Read more >

CVE-2025-4123

New Microsoft Outlook Vulnerability Enables Local Code Execution (CVE-2025-47176)

Published: June 11, 2025 Threat Level: High Affected Product: Microsoft Outlook (Microsoft 365 Apps for Enterprise, Office LTSC 2024) CVSS Score: 7.8 (High) A newly…

Read more >

CVE-2025-47176

How MSSPs Are Turning Penetration Testing Into Recurring Revenue with WASP

When OP Innovate first launched WASP in 2022, we weren’t chasing unicorn status or massive VC rounds. We were focused on fixing a real problem:…

Read more >

CVE-2025-49113: Actively Exploited Critical Vulnerability in Roundcube Webmail

Severity: Critical (CVSS 9.9) Status: Active Exploitation Confirmed On June 1, 2025, Roundcube developers issued critical security updates to patch a newly discovered vulnerability in…

Read more >

CVE-2025-49113.
Under Cyber Attack?

Fill out the form and we will contact you immediately.