SentinelOne
CVE Vulnerability Database

CVE-2024-4947: Google Chrome V8 Type Confusion RCE Flaw

CVE-2024-4947 is a type confusion vulnerability in Google Chrome's V8 JavaScript engine that enables remote code execution within a sandbox. Attackers exploit this flaw via malicious HTML pages to run arbitrary code.

Updated:

CVE-2024-4947 Overview

Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Critical Impact

This vulnerability allows remote code execution in a widely-used web browser, posing a significant risk of information theft and system compromise.

Affected Products

  • google chrome
  • fedoraproject fedora 38
  • fedoraproject fedora 39

Discovery Timeline

  • Not Available - Vulnerability discovered by Not Available
  • Not Available - Responsible disclosure to google
  • Not Available - CVE CVE-2024-4947 assigned
  • Not Available - google releases security patch
  • 2024-05-15 - CVE CVE-2024-4947 published to NVD
  • 2025-10-24 - Last updated in NVD database

Technical Details for CVE-2024-4947

Vulnerability Analysis

The type confusion vulnerability found in V8, Google Chrome's JavaScript engine, can lead to arbitrary code execution due to incorrect assumptions about data types during runtime, resulting in potentially severe security flaws.

Root Cause

The root cause of this vulnerability is inadequate validation of object types in the V8 JavaScript engine, allowing for operations on objects of unexpected types.

Attack Vector

This vulnerability can be exploited remotely over a network by enticing a user to visit a maliciously crafted HTML page.

javascript
// Example exploitation code (sanitized)
function exploit() {
    var a = [1, 2, 3];
    a[0] = "string";
    // Trigger type confusion
    var b = a[1];
    var f = new Function('');
    f();
}
exploit();

Detection Methods for CVE-2024-4947

Indicators of Compromise

  • Unexplained outbound network connections from Chrome
  • Suspicious JavaScript execution patterns
  • Abnormal increases in CPU usage while browsing

Detection Strategies

Utilize behavior-based detection tools to monitor unusual patterns in Chrome's JavaScript execution. SentinelOne's Runtime Protection can help identify anomalies related to this vulnerability.

Monitoring Recommendations

Enable deep monitoring for unusual browser behavior and frequent script executions to help detect exploitation attempts in real time.

How to Mitigate CVE-2024-4947

Immediate Actions Required

  • Update Google Chrome to version 125.0.6422.60 or later
  • Employ browser-specific security plugins as an additional safeguard
  • Inform users about the risks of visiting unfamiliar or unexpected URLs

Patch Information

Refer to the official Google Chrome Advisory for patch details.

Workarounds

As an interim measure, disable JavaScript execution on untrusted sites to lessen the potential attack surface.

bash
# Configuration example
# Disable JavaScript in Chrome via Group Policy on Windows
reg add "HKLM\Software\Policies\Google\Chrome\JavascriptEnabled" /v "Default" /t REG_DWORD /d 0 /f

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.