Kaspersky Lab has identified in the wild exploitation of the vulnerability. This vulnerability was used in Operation WizardOpium campaign against Korean users.
Vulnerability details
Advisory: SB2019110106 - Remote code execution in Google Chrome
Vulnerable component: Google Chrome
CVE-ID: CVE-2019-13720
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-416 - Use After Free
Description:
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content within the audio component. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a use-after-free error and execute arbitrary code on the target system.
Note, this vulnerability is being actively exploited in the wild.
Known APT campaigns:
Operation WizardOpium
Public Exploits:
- Google Chrome 78.0.3904.70 - Remote Code Execution [Exploit-DB]