CVE-2023-4076

8.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Chrome's WebRTC component that allows remote attackers to potentially exploit heap corruption. Attackers could execute arbitrary code or cause browser crashes by tricking users into visiting malicious websites with crafted WebRTC sessions. All Chrome users prior to version 115.0.5790.170 are affected.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 115.0.5790.170
Operating Systems: Windows, Linux, macOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. WebRTC is enabled by default.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Browser crashes, denial of service, or limited code execution within sandbox boundaries.

🟢

If Mitigated

Browser crash with no data compromise if sandbox holds, or blocked exploit due to security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious site) but no authentication. Chrome's sandbox may limit impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 115.0.5790.170 and later

Vendor Advisory: https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click three-dot menu → Help → About Google Chrome. 3. Chrome will check for and apply updates automatically. 4. Click 'Relaunch' when prompted.

🔧 Temporary Workarounds

Disable WebRTC

all

Temporarily disable WebRTC functionality to prevent exploitation.

chrome://flags/#disable-webrtc
Set 'WebRTC' flag to 'Disabled'

Use browser extensions

all

Install extensions that block WebRTC or restrict its functionality.

🧯 If You Can't Patch

  • Restrict browser usage to trusted websites only
  • Implement network filtering to block malicious WebRTC traffic

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: if below 115.0.5790.170, system is vulnerable.

Check Version:

google-chrome --version (Linux) or chrome://version (all platforms)

Verify Fix Applied:

Confirm Chrome version is 115.0.5790.170 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports
  • WebRTC-related errors in browser logs

Network Indicators:

  • Unusual WebRTC traffic patterns
  • Suspicious STUN/TURN protocol usage

SIEM Query:

source="chrome" AND (event="crash" OR message="*WebRTC*")

🔗 References

📤 Share & Export