Multiple vulnerabilities in Google ChromeOS



Published: 2024-03-20
Risk Critical
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-0204
CVE-2024-6040
CWE-ID CWE-862
CWE-20
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Chrome OS
Operating systems & Components / Operating system

Vendor Google

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Missing Authorization

EUVDB-ID: #VU85739

Risk: Critical

CVSSv3.1: 9.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2024-0204

CWE-ID: CWE-862 - Missing Authorization

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to missing authorization checks related to the InitialAccountSetup.xhtml file along with a path normalization issue. A remote non-authenticated attacker can bypass authentication process and gain full control over the system by creating an administrative account.

Exploit example to access the initial setup page bypassing the authorization check:

https://[host]:8001/goanywhere/images/..;/wizard/InitialAccountSetup.xhtml

Mitigation

Install update from vendor's website.

Vulnerable software versions

Chrome OS: before 120.0.6099.301

External links

http://chromereleases.googleblog.com/2024/03/long-term-support-channel-update-for_11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.

2) Input validation error

EUVDB-ID: #VU87650

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-6040

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to unspecified error within the Linux kernel. A local user can execute arbitrary code with elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Chrome OS: before 120.0.6099.301

External links

http://chromereleases.googleblog.com/2024/03/long-term-support-channel-update-for_11.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###