CVE-2023-4368
📋 TL;DR
This vulnerability allows attackers to bypass enterprise policies in Google Chrome by convincing users to install malicious extensions. It affects Chrome users with enterprise policies configured, particularly in managed environments. The attacker needs user interaction to install the malicious extension.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →⚠️ Risk & Real-World Impact
Worst Case
Enterprise security policies are completely bypassed, allowing malicious extensions to operate with elevated privileges and access restricted data or systems.
Likely Case
Targeted attacks against organizations where attackers use social engineering to install malicious extensions that bypass security controls.
If Mitigated
With proper extension management controls and user training, the risk is limited to isolated incidents that can be quickly contained.
🎯 Exploit Status
Requires user interaction to install malicious extension. No public exploit code available as of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 116.0.5845.96 and later
Vendor Advisory: https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
Restart Required: Yes
Instructions:
1. Open Chrome menu > Help > About Google Chrome. 2. Chrome will automatically check for updates. 3. If update available, click 'Relaunch' to apply. 4. For enterprise deployments, push Chrome 116.0.5845.96 or later via management tools.
🔧 Temporary Workarounds
Disable extension installation
allTemporarily block all extension installations via enterprise policy
For Windows GPO: Configure 'ExtensionInstallBlocklist' policy to '*'
For macOS/Linux: Set ExtensionInstallBlocklist to * in policies.json
Restrict extension sources
allOnly allow extensions from Chrome Web Store
Set ExtensionInstallSources policy to only allow https://chrome.google.com/webstore/*
🧯 If You Can't Patch
- Implement strict extension whitelisting policies
- Deploy endpoint protection that monitors for suspicious extension activity
- Educate users about risks of installing unknown extensions
- Monitor for unusual extension installation events in logs
🔍 How to Verify
Check if Vulnerable:
Check Chrome version: If version is less than 116.0.5845.96 and enterprise policies are configured, system is vulnerable.
Check Version:
chrome://version/ or 'google-chrome --version' on command line
Verify Fix Applied:
Verify Chrome version is 116.0.5845.96 or higher and test that enterprise policies cannot be bypassed by test extensions.
📡 Detection & Monitoring
Log Indicators:
- Unexpected extension installation events
- Policy violation alerts in Chrome enterprise logs
- Extensions with unusual permissions being installed
Network Indicators:
- Downloads of extensions from non-Chrome Web Store sources
- Unusual outbound connections from Chrome extension processes
SIEM Query:
source="chrome_enterprise" AND (event="extension_install" OR event="policy_violation")
🔗 References
- https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
- https://crbug.com/1467751
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
- https://security.gentoo.org/glsa/202401-34
- https://www.debian.org/security/2023/dsa-5479
- https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
- https://crbug.com/1467751
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
- https://security.gentoo.org/glsa/202401-34
- https://www.debian.org/security/2023/dsa-5479