Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-13755 : What You Need to Know

Discover the impact of CVE-2019-13755, a vulnerability in Google Chrome versions before 79.0.3945.79 allowing remote extension disabling. Learn mitigation steps and affected systems.

A vulnerability in Google Chrome versions before 79.0.3945.79 enabled an attacker to remotely disable extensions by exploiting weak policy enforcement in extensions.

Understanding CVE-2019-13755

Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to disable extensions via a crafted HTML page.

What is CVE-2019-13755?

        CVE ID: CVE-2019-13755
        Published Date: December 10, 2019
        Update Date: March 13, 2020
        Severity: High

The Impact of CVE-2019-13755

This vulnerability allowed attackers to remotely disable extensions in Google Chrome, compromising the security and functionality of the browser.

Technical Details of CVE-2019-13755

Google Chrome versions before 79.0.3945.79 were affected by this vulnerability.

Vulnerability Description

        Type: Insufficient policy enforcement
        Exploitation: Attacker could disable extensions remotely

Affected Systems and Versions

        Product: Chrome
        Vendor: Google
        Versions Affected: < 79.0.3945.79

Exploitation Mechanism

        Attacker exploited weak policy enforcement in extensions to disable them remotely.

Mitigation and Prevention

It is crucial to take immediate steps to address and prevent such vulnerabilities.

Immediate Steps to Take

        Update Google Chrome to version 79.0.3945.79 or later.
        Regularly monitor for security advisories and updates.

Long-Term Security Practices

        Implement strong security policies for browser extensions.
        Educate users on safe browsing practices to prevent exploitation.

Patching and Updates

        Regularly apply security patches and updates for Google Chrome to mitigate known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now