← Back to exposed-win-zero-days

CVE-2024-9680

Browser Zero-Day (Chrome) & Windows Sandbox Escape Exploit Chain

Overview

CVE-2024-9680 is a zero-day vulnerability in the Chrome browser, specifically a use-after-free bug in the Animation timeline. It was exploited in the wild in 2024, often chained with CVE-2024-49039 (Windows Sandbox Escape) to install persistent malware on host systems.

Technical Details

Exploitation

Attackers used CVE-2024-9680 to achieve remote code execution in the Chrome browser. The exploit was typically delivered via malicious websites or ads. Once the browser was compromised, the attackers chained it with a Windows sandbox escape (CVE-2024-49039) to break out of the browser sandbox and install malware persistently on the host.

This exploit chain was observed in malware campaigns, where users were tricked into visiting malicious sites. The browser exploit would run in the sandbox, and the Windows zero-day would allow the malware to escape and gain elevated privileges on the system.

Windows Connection

While CVE-2024-9680 itself is a browser vulnerability, its real-world impact was amplified by its use alongside Windows zero-days. The combination allowed attackers to:

Affected Systems

Patch Information

Google patched CVE-2024-9680 in early 2024. Users are strongly advised to keep their browsers and operating systems up to date to prevent exploitation.

Mitigation

References