Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Google Chrome Zero-Day Vulnerability Exploited in the Wild

Issued: 
Sunday, 18 July, 2021
Last Revision: 
Sunday, 18 July, 2021
Vendor: 
Product: 
Severity Level: 
Summary: 
Vulnerability related to Google Chrome has been exploited in a wild, threat actors have used both the Chrome and Windows exploits to gain a foothold in the targeted system, the stager module downloads and executes a more complex malware dropper from a remote server, We already had shared Windows related vulnerabilities in Microsoft July Update Fixes Multiple Zero-Days Exploited
 
Both  CVE-2021-21166 and CVE-2021-30551 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21166 was reported by Alison Huffman from the Microsoft Browser Vulnerability Research team on February 11 and is described as an "object lifecycle issue in audio."
CVE-2021-30551 The vulnerability was discovered by Sergei Glazunov of Google Project Zero in first week of June 2021. This vulnerability is related to a Windows flaw, that Google researchers discovered and Microsoft releases patchon 8 th June 2021.
 
Shane Huntley, Director of Google's Threat Analysis Group, says that this zero-day was utilized by the same threat actors using the Windows CVE-2021-33742 zero-day fixed by Microsoft
Recommendation: 
• Apply the stable channel update provided by Google to vulnerable systems immediately 
after appropriate testing.
• Run all software as a non-privileged user (one without administrative privileges) to diminish 
the effects of a successful attack.
• Remind users not to visit un-trusted websites or follow links provided by unknown or untrusted sources.
• Inform and educate users regarding the threats posed by hypertext links contained in emails 
or attachments especially from un-trusted sources.
• Apply the Principle of Least Privilege to all systems and services