Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-6178 : Security Advisory and Response

In Google Chrome before 68.0.3440.75, CVE-2018-6178 allowed attackers to deceive users into installing harmful extensions, compromising Chrome Security UI. Learn how to mitigate this vulnerability.

In versions of Google Chrome before 68.0.3440.75, a vulnerability allowed attackers to deceive users into installing harmful extensions, enabling them to hide Chrome Security UI.

Understanding CVE-2018-6178

In this CVE, an issue in Google Chrome's DevTools allowed attackers to manipulate infobar elements to trick users into installing malicious extensions.

What is CVE-2018-6178?

        Before version 68.0.3440.75 of Google Chrome, attackers could exploit an infobar vulnerability to deceive users into installing harmful extensions.
        The malicious extension enabled attackers to hide Chrome Security UI through a carefully crafted Chrome Extension.

The Impact of CVE-2018-6178

        Attackers could execute social engineering attacks to trick users into installing malicious extensions, compromising the security of Chrome users.

Technical Details of CVE-2018-6178

This section provides more in-depth technical information about the vulnerability.

Vulnerability Description

        Eliding from the incorrect side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75 allowed an attacker to deceive a user into installing a harmful extension.

Affected Systems and Versions

        Product: Chrome
        Vendor: Google
        Versions Affected: < 68.0.3440.75

Exploitation Mechanism

        Attackers could manipulate infobar elements in DevTools to deceive users into installing malicious extensions, compromising Chrome Security UI.

Mitigation and Prevention

Protecting systems from this vulnerability requires immediate actions and long-term security practices.

Immediate Steps to Take

        Update Google Chrome to version 68.0.3440.75 or higher to mitigate the vulnerability.
        Be cautious when installing extensions and only use trusted sources.

Long-Term Security Practices

        Educate users about the risks of installing unverified extensions.
        Regularly monitor and review installed Chrome extensions for any suspicious behavior.

Patching and Updates

        Regularly update Google Chrome to the latest version to ensure protection against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now