Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2021-37997 CVE-2021-37998 CVE-2021-37999 CVE-2021-38000 CVE-2021-38001 CVE-2021-38002 CVE-2021-38003 CVE-2021-38004 |
CWE-ID | CWE-416 CWE-20 CWE-749 CWE-843 CWE-358 CWE-841 |
Exploitation vector | Network |
Public exploit |
Vulnerability #4 is being exploited in the wild. Public exploit code for vulnerability #5 is available. Vulnerability #7 is being exploited in the wild. |
Vulnerable software |
Google Chrome Client/Desktop applications / Web browsers Google Chromium Client/Desktop applications / Web browsers |
Vendor |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
Updated: 17.01.2022
Added vulnerability #8.
EUVDB-ID: #VU57760
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-37997
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Sign-In component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to version 95.0.4638.69.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 95.0.4638.54
CPE2.3http://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
http://crbug.com/1259864
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37997
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57761
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-37998
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Garbage Collection component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to version 95.0.4638.69.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 95.0.4638.54
CPE2.3http://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
http://crbug.com/1259587
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37998
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57762
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-37999
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to improper input validation in New Tab Page in Google Chrome. A remote attacker can trick the victim to visit a specially crafted webpage and execute arbitrary code on the system.
MitigationUpdate to version 95.0.4638.69.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 95.0.4638.54
CPE2.3http://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
http://crbug.com/1251541
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-37999
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57766
Risk: Critical
CVSSv3.1: 8.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]
CVE-ID: CVE-2021-38000
CWE-ID:
CWE-749 - Exposed Dangerous Method or Function
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insecure implementation in V8 engine in Google Chrome. A remote attacker can create a specially crafted website, trick the victim into visiting it and execute arbitrary code on the system.
Note, the vulnerability is being actively exploited in the wild.
Install updates from vendor's website.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 95.0.4638.54
CPE2.3http://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
http://crbug.com/1263462
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38000
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU57763
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2021-38001
CWE-ID:
CWE-843 - Type confusion
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a type confusion error within the V8 component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a type confusion error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate to version 95.0.4638.69.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 95.0.4638.54
CPE2.3http://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
http://crbug.com/1260577
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38001
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU57764
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-38002
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the Web Transport component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate to version 95.0.4638.69.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 95.0.4638.54
CPE2.3http://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
http://crbug.com/1260940
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38002
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57765
Risk: Critical
CVSSv3.1: 8.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]
CVE-ID: CVE-2021-38003
CWE-ID:
CWE-358 - Improperly Implemented Security Check for Standard
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to incorrect implementation in the V8 engine in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and compromise the system.
Note, the vulnerability is being actively exploited in the wild.
Update to version 95.0.4638.69.
Vulnerable software versionsGoogle Chrome: 70.0.3538.67 - 95.0.4638.54
CPE2.3http://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
http://crbug.com/1263462
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38003
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU59668
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-38004
CWE-ID:
CWE-841 - Improper Enforcement of Behavioral Workflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient policy enforcement in Autofill. A remote attacker can create a specially crafted web page, trick the victim into visiting it and bypass implemented security restrictions.
Update to version 95.0.4638.69.
Vulnerable software versionsGoogle Chromium: 95.0.4638.0 - 95.0.4638.68
CPE2.3http://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
http://crbug.com/1227170
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.