CVE-2022-2163
📋 TL;DR
This is a use-after-free vulnerability in Google Chrome's Cast UI and Toolbar components. An attacker who convinces a user to install a malicious extension could exploit heap corruption through UI interactions, potentially leading to arbitrary code execution. Users running Chrome versions prior to 103.0.5060.134 are affected.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Extra Packages For Enterprise Linux by Fedoraproject
View all CVEs affecting Extra Packages For Enterprise Linux →
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via arbitrary code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.
Likely Case
Browser crash or limited memory corruption due to the requirement of user installing a malicious extension and specific UI interactions.
If Mitigated
No impact if Chrome is updated to patched version or malicious extensions are prevented from installation.
🎯 Exploit Status
Exploitation requires social engineering to install malicious extension plus specific user interactions with Cast UI/toolbar.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 103.0.5060.134 and later
Vendor Advisory: https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html
Restart Required: Yes
Instructions:
1. Open Chrome. 2. Click three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the update.
🔧 Temporary Workarounds
Disable Chrome auto-updates
allPrevent automatic updates to maintain controlled patching schedule
# Linux: sudo apt-mark hold google-chrome-stable
# Windows: Use Group Policy to disable auto-update
Restrict extension installation
allPrevent users from installing extensions to block the attack vector
# Chrome policy: ExtensionInstallBlocklist set to *
# Enterprise: Use Chrome Enterprise policies
🧯 If You Can't Patch
- Disable Chrome Cast feature via chrome://flags/#media-router
- Implement application allowlisting to block unapproved Chrome versions
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in Settings → About Chrome. If version is below 103.0.5060.134, system is vulnerable.
Check Version:
# Windows: "C:\Program Files\Google\Chrome\Application\chrome.exe" --version
# Linux: google-chrome --version
# macOS: /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version
Verify Fix Applied:
Confirm Chrome version is 103.0.5060.134 or higher after update and restart.
📡 Detection & Monitoring
Log Indicators:
- Chrome crash reports with memory corruption signatures
- Unexpected extension installation events
- Chrome process spawning unusual child processes
Network Indicators:
- Connections to known malicious extension repositories
- Unusual outbound traffic from Chrome processes
SIEM Query:
source="chrome_logs" AND (event="crash" OR event="extension_install") AND version<"103.0.5060.134"
🔗 References
- https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html
- https://crbug.com/1308341
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7/
- https://security.gentoo.org/glsa/202208-25
- https://security.gentoo.org/glsa/202208-35
- https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html
- https://crbug.com/1308341
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7/
- https://security.gentoo.org/glsa/202208-25
- https://security.gentoo.org/glsa/202208-35