Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-6138 : Security Advisory and Response

Learn about CVE-2018-6138, a vulnerability in Google Chrome's Extensions API allowing attackers to bypass navigation restrictions by tricking users into installing malicious extensions. Find mitigation steps here.

Google Chrome before version 67.0.3396.62 had a vulnerability in the Extensions API that allowed attackers to bypass navigation restrictions by tricking users into installing a malicious extension.

Understanding CVE-2018-6138

Before version 67.0.3396.62, a lack of policy enforcement in Google Chrome's Extensions API enabled attackers to exploit users through malicious extensions.

What is CVE-2018-6138?

This CVE refers to the insufficient policy enforcement in the Extensions API of Google Chrome, allowing attackers to bypass navigation restrictions by deceiving users into installing a crafted malicious extension.

The Impact of CVE-2018-6138

The vulnerability could lead to unauthorized access, data theft, and potential compromise of user systems through malicious extensions.

Technical Details of CVE-2018-6138

Google Chrome's vulnerability in the Extensions API had the following technical details:

Vulnerability Description

        Insufficient policy enforcement in the Extensions API

Affected Systems and Versions

        Product: Chrome
        Vendor: Google
        Versions Affected: < 67.0.3396.62

Exploitation Mechanism

        Attackers exploited the vulnerability by tricking users into installing a malicious extension, bypassing navigation restrictions.

Mitigation and Prevention

To address CVE-2018-6138, consider the following steps:

Immediate Steps to Take

        Update Google Chrome to version 67.0.3396.62 or higher
        Avoid installing extensions from untrusted sources

Long-Term Security Practices

        Regularly review and remove unnecessary extensions
        Educate users on safe extension installation practices

Patching and Updates

        Apply security patches promptly to ensure protection against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now