CVE-2023-7261

7.8 HIGH

📋 TL;DR

This vulnerability in Google Chrome's updater allows a local attacker to escalate privileges by exploiting improper implementation. Attackers could gain elevated system access by tricking users into opening malicious files. This affects Chrome users on systems where the updater hasn't been patched.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers using Google Updater
Versions: Google Chrome versions prior to 1.3.36.351 of the updater component
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the Google Updater component, which is included with Chrome installations. All default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, allowing installation of persistent malware, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation enabling attackers to bypass security controls, install unwanted software, or modify system configurations.

🟢

If Mitigated

Limited impact with proper user account controls, application sandboxing, and restricted local access.

🌐 Internet-Facing: LOW - This requires local access to the system and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Local attackers or malware with initial foothold can exploit this to gain elevated privileges on affected workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and user interaction (opening malicious file). No public exploit code has been released as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Google Chrome with updater version 1.3.36.351 or later

Vendor Advisory: https://issues.chromium.org/issues/40064602

Restart Required: Yes

Instructions:

1. Open Google Chrome. 2. Click the three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the updated version.

🔧 Temporary Workarounds

Disable automatic updates (temporary)

all

Prevents the vulnerable updater from running while waiting for patch deployment

Windows: Use Group Policy to disable Chrome auto-update
macOS: sudo defaults write /Library/Preferences/com.google.Keystone.Agent checkInterval 0
Linux: Configure package manager to hold Chrome version

🧯 If You Can't Patch

  • Implement strict user account controls to limit local administrative privileges
  • Deploy application whitelisting to prevent execution of unauthorized binaries

🔍 How to Verify

Check if Vulnerable:

Check Chrome version and ensure it's older than the patched version. The vulnerability exists in the updater component which updates automatically with Chrome.

Check Version:

chrome://version/ in Chrome browser address bar

Verify Fix Applied:

Verify Chrome is updated to latest version and check that no suspicious privilege escalation attempts have occurred in system logs.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Chrome updater processes running with elevated privileges
  • File creation/modification in system directories by Chrome processes
  • Security event logs showing privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from Chrome updater process
  • Downloads from unexpected sources by Chrome components

SIEM Query:

Process creation where parent_process contains 'chrome' and process_name contains 'updater' and integrity_level changes

🔗 References

📤 Share & Export