INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Multiple sectors HIGH 35m Global vulnerability Government and Critical Infrastructure CRITICAL 42m Global vulnerability Multiple sectors CRITICAL 58m Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global vulnerability Information Technology / Software Infrastructure CRITICAL 1h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 2h Global data_breach Multiple sectors HIGH 35m Global vulnerability Government and Critical Infrastructure CRITICAL 42m Global vulnerability Multiple sectors CRITICAL 58m Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global vulnerability Information Technology / Software Infrastructure CRITICAL 1h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 2h Global data_breach Multiple sectors HIGH 35m Global vulnerability Government and Critical Infrastructure CRITICAL 42m Global vulnerability Multiple sectors CRITICAL 58m Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global vulnerability Information Technology / Software Infrastructure CRITICAL 1h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 2h
Vulnerabilities

CVE-2021-37975

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Google Chromium V8 Use-After-Free Vulnerability — Google Chromium V8 Engine contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted H
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Google Chromium V8 Use-After-Free Vulnerability — Google Chromium V8 Engine contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

🤖 AI Executive Summary

CVE-2021-37975 is a critical use-after-free vulnerability in Google Chromium V8 engine with a CVSS score of 9.0, allowing remote attackers to exploit heap corruption through malicious HTML pages. This vulnerability affects all Chromium-based browsers including Chrome, Edge, and Opera, posing significant risk to Saudi users and organizations. Exploitation requires only user interaction with a crafted webpage, making it highly dangerous in the current threat landscape. Immediate patching is essential as exploits are publicly available.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 04:56
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses critical risk to Saudi banking sector (SAMA-regulated institutions), government agencies (NCA oversight), and telecommunications companies (STC, Mobily). Saudi financial institutions relying on web-based banking platforms and government portals are at high risk. Healthcare organizations using web-based systems and ARAMCO's digital infrastructure could be compromised. The widespread use of Chromium-based browsers across Saudi enterprises makes this a pervasive threat affecting employee workstations, customer-facing applications, and critical infrastructure interfaces.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare Energy and Oil & Gas Telecommunications Education Retail and E-commerce Insurance
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Chromium-based browsers in use (Chrome, Edge, Opera, Brave) across your organization
2. Enable automatic browser updates or manually update to patched versions immediately
3. Block access to untrusted websites and implement web filtering
4. Disable JavaScript execution in browsers if operationally feasible

PATCHING GUIDANCE:
1. Update Google Chrome to version 93.0.4577.82 or later
2. Update Microsoft Edge to version 93.0.961.52 or later
3. Update Opera to version 77.0 or later
4. Verify patch installation through browser version checks (chrome://version)

COMPENSATING CONTROLS:
1. Implement Content Security Policy (CSP) headers to restrict script execution
2. Deploy web application firewalls (WAF) to detect malicious payloads
3. Use browser isolation technology for high-risk users
4. Monitor for suspicious process creation and memory access patterns

DETECTION RULES:
1. Monitor for unexpected child processes spawned by browser processes
2. Alert on abnormal memory access patterns in V8 engine processes
3. Track browser crashes and segmentation faults
4. Monitor for exploitation attempts via IDS/IPS signatures for CVE-2021-37975
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع متصفحات Chromium المستخدمة (Chrome و Edge و Opera و Brave) في المؤسسة
2. تفعيل التحديثات التلقائية للمتصفح أو التحديث اليدوي للإصدارات المصححة فوراً
3. حظر الوصول إلى المواقع غير الموثوقة وتطبيق تصفية الويب
4. تعطيل تنفيذ JavaScript في المتصفحات إن أمكن

إرشادات التصحيح:
1. تحديث Google Chrome إلى الإصدار 93.0.4577.82 أو أحدث
2. تحديث Microsoft Edge إلى الإصدار 93.0.961.52 أو أحدث
3. تحديث Opera إلى الإصدار 77.0 أو أحدث
4. التحقق من تثبيت التصحيح من خلال فحوصات إصدار المتصفح

الضوابط البديلة:
1. تطبيق سياسة أمان المحتوى (CSP) لتقييد تنفيذ البرامج النصية
2. نشر جدران حماية تطبيقات الويب (WAF) للكشف عن الحمولات الضارة
3. استخدام تقنية عزل المتصفح للمستخدمين عالي الخطورة
4. مراقبة أنماط الوصول إلى الذاكرة المريبة

قواعد الكشف:
1. مراقبة العمليات الفرعية غير المتوقعة التي يتم إنشاؤها بواسطة عمليات المتصفح
2. تنبيهات على أنماط الوصول إلى الذاكرة غير الطبيعية في عمليات محرك V8
3. تتبع أعطال المتصفح والأخطاء في الوصول إلى الذاكرة
4. مراقبة محاولات الاستغلال عبر توقيعات IDS/IPS
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Information Security Policies and Procedures ECC 2024 A.6.1.1 - Access Control and Authentication ECC 2024 A.12.2.1 - Change Management ECC 2024 A.12.6.1 - Management of Technical Vulnerabilities
🔵 SAMA CSF
SAMA CSF ID.BE-1 - Business Environment SAMA CSF PR.IP-12 - Information and Communications Technology (ICT) Security SAMA CSF DE.CM-8 - Vulnerability Scans SAMA CSF RS.MI-2 - Incident Response and Management
🟡 ISO 27001:2022
ISO 27001:2022 A.5.1 - Policies for Information Security ISO 27001:2022 A.8.1 - User Endpoint Devices ISO 27001:2022 A.12.6.1 - Management of Technical Vulnerabilities ISO 27001:2022 A.14.2.1 - Secure Development Policy
🟣 PCI DSS v4.0
PCI DSS 6.2 - Security Patches and Updates PCI DSS 11.2 - Vulnerability Scanning
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Google:Chromium V8
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS55.21%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2021-11-17
Published 2021-11-03
Source Feed cisa_kev
Views 3
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.