February 28, 2022

CVE-2022-0609

Entry Type
Security Guidance
Platform(s) Affected
Web
Threat Type
Vulnerability
Platform(s) Affected
Security Guidance
Web
Vulnerability

Lookout Coverage and Recommendation for Admins

Since Chrome is one of the most widely-used browsers, admins should proactively enable the vulnerability protection policy in the Lookout console and configure it with the appropriate severity and remediation actions that align with their response workflows. Starting March 3rd, Lookout will alert on Chrome for Android v98.0.4758.87 or before as vulnerable to align with CISA guidelines.

Overview

Google recently discovered and disclosed an exploitable vulnerability in Chromium, which is the codebase that provides the vast majority of code for the Google Chrome browser. The vulnerability, which is identified as CVE-2022-0609, was reported by members of Google's Threat Analysis Group. It exists in the Animation component of Chromium and can be exploited with a malcrafted webpage. Successful exploitation may enable the attacker to compromise data on a vulnerable device.

Lookout Analysis

Google has noted that there are already exploits for this vulnerability in the wild on Chrome for desktop, which explains the rapid turnaround from reporting the vulnerability to releasing an app update. In addition to the known exploit that can affect desktop platforms, Lookout sees evidence that indicates that this vulnerability also affects the Android version of Chrome. Every user should update to the latest version of Chrome for Android available now on Google Play, 98.0.4758.101. In addition, United States Federal entities should heed CISA’s requirement to have it patched by March 1st, 2022.

The most likely way for an attacker to exploit this vulnerability would be to send a link leading to a malcrafted webpage to their target in hopes that the target still has a vulnerable version of Chrome on their device. A successful exploit may grant a threat actor access to Chrome's capabilities without needing to root the device. Mobile device management (MDM) tools will not detect a successful exploitation. In the event of a successful exploit, the actor could have access to any capability that the browser has. This includes access to the camera and microphone, location data, browsing history and more.

Lookout Coverage and Recommendation for Admins

Since Chrome is one of the most widely-used browsers, admins should proactively enable the vulnerability protection policy in the Lookout console and configure it with the appropriate severity and remediation actions that align with their response workflows. Starting March 3rd, Lookout will alert on Chrome for Android v98.0.4758.87 or before as vulnerable to align with CISA guidelines.

Colleagues standing in an open meeting area and sharing a humorous moment

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

Other Related Threats

New

September 22, 2023

iOS 16.6.1 and iOS 17.0

Apple recently released two software updates for iOS and iPad OS for vulnerabilities that can form an exploit chain and are also known to install Predator spyware.

September 15, 2023

Scattered Spider

September 19, 2023

CVE-2023-4863