April 4, 2022

CVE-2022-1096

Coverage and Recommendation for Lookout Admins

Since Chrome is one of the most widely-used browsers, admins should proactively enable the vulnerability protection policy in the Lookout console and configure it with the appropriate severity and remediation actions that align with their organization’s response workflows. Starting April 7th, 2022, Lookout will alert on Chrome versions 99.0.4844.83 or before as vulnerable.

Overview

An anonymous researcher recently discovered and disclosed an exploitable vulnerability in Chromium, which is the codebase that provides the vast majority of code for the Google Chrome browser. The vulnerability, which is identified as CVE-2022-1096, was reported to exist in the V8 Javascript Engine component of Chromium and can be exploited with a malcrafted webpage. Successfully exploiting the vulnerability may allow the attacker to compromise the user’s data on a vulnerable device.

Lookout Analysis

Google has noted that there are already exploits for this vulnerability in the wild on Chrome for desktop, which explains the rapid turnaround from reporting the vulnerability to releasing an app update. In addition to the known exploit that can affect desktop platforms, Lookout sees evidence that indicates that this vulnerability also affects the Android version of Chrome. Every user should update to the latest version of Chrome for Android, 99.0.4844.84 , available on Google play for most devices. In addition, United States Federal entities should heed CISA’s requirement to have it patched by April 18th, 2022.

The most likely way for an attacker to exploit this vulnerability would be to send a link leading to a malcrafted webpage to their target in hopes that the target still has a vulnerable version of Chrome on their device. A successful exploit may grant a threat actor access to Chrome's capabilities without needing to root the device. Mobile device management (MDM) tools will not detect a successful exploitation. In the event of a successful exploit, the actor could have access to any capability that the browser has. This includes access to the camera and microphone, location data, browsing history and more.

Authors

Lookout

Cloud & Endpoint Security

Lookout is a cybersecurity company that makes it possible for tens of millions of individuals, enterprises and government agencies to be both mobile and secure. Powered by a dataset of virtually all the mobile code in the world -- 40 million apps and counting -- the Lookout Security Cloud can identify connections that would otherwise go unseen and predict and stop mobile attacks before they do harm. The world’s leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Lookout is also partnered with such enterprise leaders as AirWatch, Ingram Micro, Microsoft, and MobileIron. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C.

Entry Type
Threat Guidances
Platform(s) Affected
Web
Threat Type
Vulnerability
Platform(s) Affected
Threat Guidances
Web
Vulnerability

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell