November 16, 2022

Chrome Zero Day | CVE-2022-3723

Coverage and Recommendation for Lookout Admins

Lookout admins should proactively enable the vulnerability protection policy in the Lookout console and configure it with the appropriate remediation actions that align with their organization’s response workflows. As of November 17th, 2022, Lookout will alert on Chrome for Android versions 107.0.5304.87 or before as vulnerable apps. The coverage can be tracked as “Chrome-CVE-2022- 3723.gen“. In addition, CISA is requiring all government organizations to update to the patched versions of these apps by November 18th.

Overview

Google recently released a patch for a new zero-day vulnerability found in the Chromium open-source web browser project, which provides the codebase behind popular web browsers. The vulnerability is tracked as CVE-2022-3723 and according to Google, is linked to type confusion in V8 in Google Chrome prior to 107.0.5304.87. It can allow a remote attacker to potentially exploit heap corruption via a maliciously crafted HTML page. Google has disclosed that the vulnerability is currently known to be actively exploited, making this disclosure a concern for any organization or individual that leverages the Chrome browser across Android, Windows, Mac, or Linux.

Lookout Analysis

The most likely way for an attacker to exploit this vulnerability would be to send a link leading to a malcrafted webpage to their target in hopes that the target still has a vulnerable version of Chrome on their device. A successful exploit may grant a threat actor access to Chrome's capabilities without needing to root the device. Mobile device management (MDM) tools will not detect a successful exploitation. In the event of a successful exploit, the actor could have access to any capability that the browser has.

Authors

Lookout

Cloud & Endpoint Security

Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves.

Entry Type
Threat Guidances
Platform(s) Affected
Web
Threat Type
Vulnerability
Platform(s) Affected
Threat Guidances
Web
Vulnerability

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell