CVE-2022-0980

8.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Google Chrome's New Tab Page that allows heap corruption. Attackers who convince users to install malicious extensions can potentially exploit this to execute arbitrary code. All Chrome users prior to version 99.0.4844.74 are affected.

💻 Affected Systems

Products:
  • Google Chrome
Versions: All versions prior to 99.0.4844.74
Operating Systems: Windows, macOS, Linux, Chrome OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to install a malicious extension and perform specific interactions on New Tab Page

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or ransomware deployment

🟠

Likely Case

Browser crash or limited data leakage from browser memory

🟢

If Mitigated

No impact if Chrome is updated to patched version

🌐 Internet-Facing: HIGH - Exploitation requires user interaction but can be triggered via web content
🏢 Internal Only: MEDIUM - Requires user to install malicious extension, which is less likely in controlled environments

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user to install malicious extension and perform specific interactions, making widespread attacks less likely

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 99.0.4844.74 and later

Vendor Advisory: https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_15.html

Restart Required: Yes

Instructions:

Open Chrome
Click three-dot menu → Help → About Google Chrome
Allow Chrome to check for and install updates
Click 'Relaunch' when prompted

🔧 Temporary Workarounds

Disable extension installation

all

Prevent users from installing extensions to block the attack vector

For enterprise: Use Chrome Enterprise policies to disable extension installation

Use Chrome sandboxing

all

Ensure Chrome sandbox is enabled to limit potential damage

Verify Chrome is running with --no-sandbox flag NOT present

🧯 If You Can't Patch

  • Restrict extension installation to trusted sources only
  • Implement application whitelisting to prevent unauthorized Chrome execution

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in About Google Chrome page

Check Version:

chrome://version/ or 'google-chrome --version' on command line

Verify Fix Applied:

Confirm Chrome version is 99.0.4844.74 or higher

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with memory corruption signatures
  • Unexpected extension installation events

Network Indicators:

  • Downloads of suspicious Chrome extensions
  • Connections to known malicious extension repositories

SIEM Query:

Process:chrome.exe AND (EventID:1000 OR EventID:1001) AND ExceptionCode:0xc0000005

🔗 References

📤 Share & Export