December 9, 2022

ChromeHeap | CVE-2022-4135

Entry Type
Security Guidance
Platform(s) Affected
Web
Threat Type
Vulnerability
Platform(s) Affected
Security Guidance
Web
Vulnerability

Coverage and Recommendation for Lookout Admins

Lookout admins should proactively enable the vulnerability protection policy in the Lookout console and configure it with the appropriate remediation actions that align with their organization’s response workflows. As of December 8th, 2022, Lookout will alert on Chrome for Android versions 107.0.5304.140 or before and Edge for Android versions 107.0.1418.61 or before as vulnerable apps. In addition, CISA is requiring all government organizations to update to the patched versions of these apps by December 19th, 2022.

Overview

Google recently released a patch for a new zero-day vulnerability, tracked as CVE-2022-4135, found in the Chromium open-source web browser project, which provides the codebase for many popular browsers. This vulnerability is reported to be of critical severity at a CVSS 3.x score of 9.6 and exists in the GPU component causing a heap buffer overflow. Reportedly, this CVE affects older versions of Google Chrome and Microsoft Edge, and patches have been released for both in response to this zero-day. Google has disclosed that the vulnerability is currently known to be actively exploited, making this disclosure a concern for any organization or individual that leverages the Chrome browser across Android, Windows, Mac, or Linux.

Lookout Analysis

The most likely way for an attacker to exploit this vulnerability would be to send a link leading to a malcrafted webpage to their target in hopes that the target still has a vulnerable version of Chrome on their device. A successful exploit may grant a threat actor access to Chrome's capabilities without needing to root the device. It can enable threat actors to crash a program or execute codes remotely.

Mobile device management (MDM) tools will not detect a successful exploitation. In the event of a successful exploit, the actor could have access to any capability that the browser has. Per NIST’s national vulnerability database, this can arm “a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page”

Coverage and Recommendation for Lookout Admins

Lookout admins should proactively enable the vulnerability protection policy in the Lookout console and configure it with the appropriate remediation actions that align with their organization’s response workflows. As of December 8th, 2022, Lookout will alert on Chrome for Android versions 107.0.5304.140 or before and Edge for Android versions 107.0.1418.61 or before as vulnerable apps. In addition, CISA is requiring all government organizations to update to the patched versions of these apps by December 19th, 2022.

Colleagues standing in an open meeting area and sharing a humorous moment

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

Other Related Threats

New

September 22, 2023

iOS 16.6.1 and iOS 17.0

Apple recently released two software updates for iOS and iPad OS for vulnerabilities that can form an exploit chain and are also known to install Predator spyware.

September 15, 2023

Scattered Spider

September 19, 2023

CVE-2023-4863