Coverage and Recommendation for Lookout Admins
Since Chrome is one of the most widely-used browsers, admins should proactively enable the vulnerability protection policy in the Lookout console and configure it with the appropriate severity and remediation actions that align with their organization’s response workflows. As of April 28th, 2022, Lookout will alert on Chrome versions 100.0.4896.126 or before as vulnerable and display the vulnerability in the Lookout Admin Console under the family name Chrome-CVE-2022-1364.
Google has noted that there are already exploits for this vulnerability in the wild on Chrome for desktop as well as Chrome for Android, which explains the rapid turnaround from reporting the vulnerability to releasing an app update. Every user should update to the latest version of Chrome for Android, 100.0.4896.127, available on Google play for most devices. In addition, United States Federal entities should heed CISA's requirement to have it patched by May 6th, 2022.
The most likely way for an attacker to exploit this vulnerability would be to send a link leading to a malcrafted webpage to their target in hopes that the target still has a vulnerable version of Chrome on their device. A successful exploit may grant a threat actor access to Chrome's capabilities without needing to root the device. Mobile device management (MDM) tools will not detect a successful exploitation. In the event of a successful exploit, the actor could have access to any capability that the browser has. This includes access to the camera and microphone, location data, browsing history and more.