⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2021-11-17. Required action: Apply updates per vendor instructions..
Severity
8.8HIGHNVD
EPSS
92.6%
top 0.26%
CISA KEV
KEV
Added 2021-11-03
Due 2021-11-17
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedApr 26
KEV addedNov 3
KEV dueNov 17
Latest updateOct 5
CISA Required Action: Apply updates per vendor instructions.

Description

Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5google/chromeunspecified89.0.4389.128
NVDgoogle/chrome< 89.0.4389.128
debiandebian/chromium< chromium 90.0.4430.72-1 (bookworm)
Debianchromium/chromium< 90.0.4430.72-1+3

Also affects: Fedora 32, 33, 34

🔴Vulnerability Details

3
GHSA
GHSA-5cw9-vvr5-jcwf: Insufficient validation of untrusted input in V8 in Google Chrome prior to 892022-05-24
OSV
CVE-2021-21220: Insufficient validation of untrusted input in V8 in Google Chrome prior to 892021-04-26
VulnCheck
Google Chromium V8 Improper Input Validation Vulnerability2021

💥Exploits & PoCs

1
Metasploit
Google Chrome versions before 89.0.4389.128 V8 XOR Typer Out-Of-Bounds Access RCE

📋Vendor Advisories

4
CISA
Google Chromium V8 Improper Input Validation Vulnerability2021-11-03
Chrome
Stable Channel Update for Desktop: CVE-2021-212062021-04-13
Microsoft
Chromium: CVE-2021-21220 Insufficient validation of untrusted input in V8 for x86_642021-04-13
Debian
CVE-2021-21220: chromium - Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0....2021

🕵️Threat Intelligence

18
Trendmicro
How Water Labbu Exploits Electron-Based Applications2022-10-05
Trendmicro
How Water Labbu Exploits Electron-Based Applications2022-10-05
Trendmicro
How Water Labbu Exploits Electron-Based Applications2022-10-05
Trendmicro
How Water Labbu Exploits Electron-Based Applications2022-10-05
Trendmicro
How Water Labbu Exploits Electron-Based Applications2022-10-05

📐Framework References

2
CWE
Improper Input Validation
CWE
Out-of-bounds Write

📄Research Papers

1
arXiv
A Survey on Data-driven Software Vulnerability Assessment and Prioritization2022-04-04