CVE-2022-0608

8.8 HIGH

📋 TL;DR

This vulnerability is an integer overflow in Chrome's Mojo IPC framework that could allow a remote attacker to trigger heap corruption by tricking users into visiting a malicious webpage. All users running vulnerable versions of Google Chrome are affected. Successful exploitation could lead to arbitrary code execution.

💻 Affected Systems

Products:
  • Google Chrome
Versions: Versions prior to 98.0.4758.102
Operating Systems: Windows, macOS, Linux, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Extensions or security settings do not mitigate this vulnerability.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the Chrome process, potentially leading to full system compromise if Chrome is running with elevated privileges.

🟠

Likely Case

Browser crash (denial of service) or limited code execution within Chrome's sandbox, potentially allowing data theft or further exploitation.

🟢

If Mitigated

No impact if Chrome is fully patched or if exploit attempts are blocked by security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious webpage) but no authentication. The vulnerability is in Chrome's core Mojo framework, making reliable exploitation challenging but possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 98.0.4758.102 and later

Vendor Advisory: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click the three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the patched version.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents exploitation by disabling JavaScript execution, which is required for the malicious HTML page to trigger the vulnerability.

Use Chrome's Site Isolation

all

Enable site isolation to limit impact if exploitation occurs (already enabled by default in modern Chrome).

🧯 If You Can't Patch

  • Restrict access to untrusted websites using web filtering or proxy controls.
  • Use application whitelisting to prevent execution of malicious code if exploitation occurs.

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: If version is less than 98.0.4758.102, the system is vulnerable.

Check Version:

On Windows/macOS/Linux: Open Chrome and navigate to chrome://version/ or use command line: google-chrome --version

Verify Fix Applied:

Confirm Chrome version is 98.0.4758.102 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with memory corruption signatures
  • Unexpected process termination of chrome.exe or Google Chrome

Network Indicators:

  • Requests to known malicious domains hosting exploit code
  • Unusual outbound connections from Chrome process

SIEM Query:

Process:Name="chrome.exe" AND EventID=1000 (Application Crash) OR Process:Name="Google Chrome" AND TerminationReason contains "EXCEPTION_ACCESS_VIOLATION"

🔗 References

📤 Share & Export