On October 31, 2019, Google released security updates for the Chrome browser to mitigate an actively exploited zero-day vulnerability . CVE-2019-13720 is a use-after-free vulnerability in the Chrome audio component. If exploited, use-after-free vulnerabilities may allow for various multiple malicious actions. Due to the reports of active exploitation of CVE-2019-13720, users are recommended to upgrade to the most recent version of Chrome as soon as possible.
What we’re doing about it:
- The eSentire Threat Intelligence Team is actively monitoring this topic for emerging details.
- Known IoCs have been checked against esENDPOINT clients and monitoring is ongoing.
- MVS (formerly esRECON) is in the process of releasing plugins to identify this vulnerability
- Plugins are expected to be leveraged in scans starting between Saturday, November 2, and Sunday, November 3, 2019
What you should do about it:
- Update to version 78.0.3904.87 of the Chrome browser
- It should be noted that even if auto-update is enabled, users need to exit and re-open Chrome for the update to be applied
- Chrome updates for Windows can be pushed by system administrators through the Group Policy Management Editor 
Details on CVE-2019-13720 remain minimal as Google is holding onto information until users have time to update. Kaspersky identified the zero-day vulnerability and has released some additional details regarding attacks in the wild .
A second vulnerability, CVE-2019-13721, was also fixed in the most recent release of Chrome. CVE-2019-13721 is also a use-after-free vulnerability but there are currently no reports of exploitation in the wild.
Indicators of compromise :
- [email protected][.]com