June 22, 2023

Multiapp-CVE-2023-3079

Platform(s) Affected
Web
Entry Type
Security Guidance
Threat Type
Vulnerability
Platform(s) Affected
Web
Security Guidance
Vulnerability

Coverage and Recommendation for Lookout Admins

Lookout strongly suggests all mobile device users turn on the app auto-update capability on their respective devices. Lookout admins should proactively enable the vulnerability protection policy in the Lookout console and configure it with the appropriate remediation actions that align with their organization’s response workflows. As of June 15th, 2023, Lookout will alert on Chrome for Android versions 114.0.5735.59 or below and MS Edge versions 114.0.1823.40 or below under the coverage “Multiapp-CVE-2023-3079”. In addition, CISA is requiring all government organizations to update to the patched versions of these apps by June 28th, 2023.

Overview

Google released an emergency patch for a new zero-day vulnerability tracked as CVE-2023-3079 on June 5th. This type of confusion vulnerability is found in the V8 JavaScript engine of Chromium open-source web browser project, which provides the codebase for many popular browsers, including Google Chrome and MS Edge. This vulnerability has been listed in the CISA’s known exploited vulnerabilities catalog after Google disclosed CVE-2023-3079’s active exploitation in the wild, making this disclosure a concern for any organization or individual that leverages the Chromium-based browsers (Chrome and Edge) across Android, Windows, Mac, or Linux.

Lookout Analysis

The most likely way for an attacker to exploit this vulnerability would be to send a link leading to a malcrafted webpage to their target in hopes that the target still has a vulnerable version of Chrome or Edge on their device. A successful exploit may grant a threat actor access to the vulnerable browser’s capabilities without needing to root the device. It can also enable threat actors to crash a program or execute codes remotely.

Mobile device management (MDM) tools will not detect successful exploitation of this vulnerability. In the event of a successful exploit, the actor could have access to any capability that the browser has. Per NIST’s national vulnerability database, this can arm “a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)”

Coverage and Recommendation for Lookout Admins

Lookout strongly suggests all mobile device users turn on the app auto-update capability on their respective devices. Lookout admins should proactively enable the vulnerability protection policy in the Lookout console and configure it with the appropriate remediation actions that align with their organization’s response workflows. As of June 15th, 2023, Lookout will alert on Chrome for Android versions 114.0.5735.59 or below and MS Edge versions 114.0.1823.40 or below under the coverage “Multiapp-CVE-2023-3079”. In addition, CISA is requiring all government organizations to update to the patched versions of these apps by June 28th, 2023.

Colleagues standing in an open meeting area and sharing a humorous moment

Identify and Prevent Threats with Lookout Threat Advisory

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

Lookout Threat Advisory provides cutting-edge mobile threat intelligence from Lookout’s global sensor network of millions of mobile devices and insights from Lookout’s top mobile security researchers. Protecting and preventing your organization from major threats.

Other Related Threats

New

September 15, 2023

Scattered Spider

Scattered Spider, aka UNC3944, was able to successfully target and gain access to the infrastructure of Caesars Entertainment in its latest campaign

September 19, 2023

CVE-2023-4863

September 18, 2023

ASPL 2023-09-01 / CVE-2023-35674