Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-3305: Use after free in Google Chrome

0
High
VulnerabilityCVE-2022-3305cvecve-2022-3305
Published: Tue Nov 01 2022 (11/01/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Google
Product: Chrome

Description

Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 07/03/2025, 08:12:22 UTC

Technical Analysis

CVE-2022-3305 is a high-severity use-after-free vulnerability identified in the Google Chrome browser specifically affecting ChromeOS versions prior to 106.0.5249.62. The vulnerability arises from improper memory management in the 'survey' component of Chrome, where a use-after-free condition allows a remote attacker to exploit heap corruption by crafting a malicious HTML page. This type of vulnerability (CWE-416) occurs when a program continues to use a pointer after the memory it points to has been freed, leading to undefined behavior including potential arbitrary code execution. The vulnerability can be triggered remotely without requiring any privileges or authentication, but it does require user interaction, such as visiting a malicious website. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, and user interaction needed. Although no known exploits in the wild have been reported at the time of publication, the severity and nature of the flaw make it a critical concern for users of Chrome on ChromeOS. The lack of a patch link in the provided data suggests that users should verify that their ChromeOS devices are updated to versions 106.0.5249.62 or later to mitigate this vulnerability.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Google Chrome, including on ChromeOS devices in enterprise and public sector environments. Exploitation could lead to unauthorized code execution, enabling attackers to gain control over affected systems, steal sensitive data, or disrupt operations. Given the high confidentiality, integrity, and availability impact, successful exploitation could result in data breaches, espionage, or service outages. Organizations relying on ChromeOS devices for secure browsing or kiosk applications are particularly vulnerable. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users to malicious sites. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly after disclosure. The impact is compounded in sectors with strict data protection regulations such as GDPR, where breaches can lead to severe legal and financial consequences.

Mitigation Recommendations

European organizations should ensure all ChromeOS devices are updated to version 106.0.5249.62 or later as soon as possible. Since no patch links were provided, organizations should rely on official Google ChromeOS update channels to obtain the fix. Additionally, organizations should implement network-level protections such as web filtering to block access to known malicious sites and employ endpoint security solutions capable of detecting anomalous behavior indicative of exploitation attempts. User awareness training should emphasize caution when clicking on links or visiting unfamiliar websites to reduce the risk of user interaction-based attacks. Monitoring browser behavior and logs for unusual activity can help in early detection of exploitation attempts. Organizations should also consider restricting the use of ChromeOS devices to trusted networks and environments where possible, and employ application sandboxing and least privilege principles to limit the impact of potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2022-09-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda379

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/3/2025, 8:12:22 AM

Last updated: 2/7/2026, 3:36:26 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats