INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Multiple sectors CRITICAL 31m Global vulnerability Information Technology / Software Infrastructure CRITICAL 33m Global data_breach Healthcare CRITICAL 49m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 31m Global vulnerability Information Technology / Software Infrastructure CRITICAL 33m Global data_breach Healthcare CRITICAL 49m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 31m Global vulnerability Information Technology / Software Infrastructure CRITICAL 33m Global data_breach Healthcare CRITICAL 49m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h
Vulnerabilities

CVE-2021-30533

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Google Chromium PopupBlocker Security Bypass Vulnerability — Google Chromium PopupBlocker contains an insufficient policy enforcement vulnerability that allows a remote attacker to bypass navigation r
Published: Jun 27, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Google Chromium PopupBlocker Security Bypass Vulnerability — Google Chromium PopupBlocker contains an insufficient policy enforcement vulnerability that allows a remote attacker to bypass navigation restrictions via a crafted iframe. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

🤖 AI Executive Summary

CVE-2021-30533 is a critical vulnerability (CVSS 9.0) in Chromium's PopupBlocker that allows remote attackers to bypass navigation restrictions through crafted iframes. This affects all Chromium-based browsers including Chrome, Edge, and Opera, enabling malicious websites to open unwanted popups and potentially redirect users to phishing or malware sites. With public exploits available, immediate patching is essential for all Saudi organizations and users.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 20, 2026 13:15
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi banking sector (SAMA-regulated institutions), government agencies (NCA oversight), and telecommunications companies (STC, Mobily) where browser-based transactions and communications are critical. Financial institutions face elevated phishing and credential theft risks. Government employees and citizens accessing e-services through gov.sa portals are vulnerable to malicious redirects. Healthcare organizations using web-based patient portals and telehealth services are at risk. The widespread use of Chromium-based browsers across Saudi enterprises makes this a pervasive threat affecting multiple critical sectors simultaneously.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare and Medical Services Energy and Utilities Telecommunications E-commerce and Retail Education Insurance
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Chromium-based browsers in use (Chrome, Edge, Opera, Brave) across your organization
2. Check current browser versions against patched versions (Chrome 91.0.4472.124+, Edge 91.0.864.59+)
3. Enable automatic browser updates if not already configured
4. Communicate urgency to all users regarding immediate browser updates

PATCHING GUIDANCE:
1. Deploy browser updates through your MDM/EMM solution for managed devices
2. For unmanaged devices, provide clear instructions for manual updates
3. Verify patch deployment through browser version checks (Settings > About)
4. Test critical web applications post-patching for compatibility

COMPENSATING CONTROLS (if immediate patching delayed):
1. Implement web filtering to block known malicious domains
2. Deploy browser isolation technology for high-risk users
3. Enforce Content Security Policy (CSP) headers on internal web applications
4. Disable JavaScript execution in untrusted contexts where possible
5. Implement popup blocking at network level using proxy/firewall rules

DETECTION RULES:
1. Monitor for iframe-based navigation attempts in web logs
2. Alert on unexpected popup window creation events
3. Track browser version compliance in endpoint management systems
4. Monitor for CSP violations indicating popup bypass attempts
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع متصفحات Chromium المستخدمة (Chrome و Edge و Opera و Brave) في مؤسستك
2. التحقق من إصدارات المتصفح الحالية مقابل الإصدارات المصححة (Chrome 91.0.4472.124+ و Edge 91.0.864.59+)
3. تفعيل تحديثات المتصفح التلقائية إن لم تكن مفعلة
4. التواصل مع جميع المستخدمين بشأن ضرورة تحديث المتصفح الفوري

إرشادات التصحيح:
1. نشر تحديثات المتصفح من خلال حل MDM/EMM الخاص بك للأجهزة المدارة
2. للأجهزة غير المدارة، توفير تعليمات واضحة للتحديثات اليدوية
3. التحقق من نشر التصحيح من خلال فحوصات إصدار المتصفح
4. اختبار تطبيقات الويب الحرجة بعد التصحيح للتوافقية

الضوابط البديلة (إذا تأخر التصحيح الفوري):
1. تنفيذ تصفية الويب لحجب النطاقات الضارة المعروفة
2. نشر تكنولوجيا عزل المتصفح للمستخدمين عالي الخطورة
3. فرض رؤوس سياسة أمان المحتوى على تطبيقات الويب الداخلية
4. تعطيل تنفيذ JavaScript في السياقات غير الموثوقة حيثما أمكن
5. تنفيذ حجب النوافذ المنبثقة على مستوى الشبكة باستخدام قواعد الوكيل/جدار الحماية

قواعد الكشف:
1. مراقبة محاولات الملاحة القائمة على iframe في سجلات الويب
2. التنبيه على أحداث إنشاء نافذة منبثقة غير متوقعة
3. تتبع امتثال إصدار المتصفح في أنظمة إدارة نقاط النهاية
4. مراقبة انتهاكات CSP التي تشير إلى محاولات تجاوز النوافذ المنبثقة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5.1.1 - Information Security Policies and Procedures 5.2.1 - Access Control and Authentication 5.3.1 - Cryptography and Data Protection 5.4.1 - System and Communications Protection 5.5.1 - Incident Management
🔵 SAMA CSF
Governance - Risk Management Framework Protect - Access Control and Authentication Protect - Data Protection and Privacy Detect - Security Monitoring and Logging Respond - Incident Response Procedures
🟡 ISO 27001:2022
A.5.1 - Policies for Information Security A.6.1 - Organization of Information Security A.8.1 - Asset Management A.13.1 - Network Security A.14.1 - Secure Development and Maintenance
🟣 PCI DSS v4.0
Requirement 2.1 - Change default passwords Requirement 6.2 - Security patches and updates Requirement 11.2 - Vulnerability scanning
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Google:Chromium PopupBlocker
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS10.53%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-07-18
Published 2022-06-27
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.