CVE-2022-3313: Incorrect security UI in Google Chrome
Incorrect security UI in full screen in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
AI Analysis
Technical Summary
CVE-2022-3313 is a security vulnerability identified in Google Chrome versions prior to 106.0.5249.62. The flaw pertains to an incorrect security user interface (UI) behavior when Chrome is running in full-screen mode. Specifically, this vulnerability allows a remote attacker to craft a malicious HTML page that can spoof the browser's security UI elements. The spoofing could mislead users into believing they are interacting with legitimate browser security indicators, such as the URL bar or security status icons, when in fact they are not. This type of UI spoofing attack can facilitate phishing or social engineering attacks by tricking users into divulging sensitive information or performing unsafe actions under false pretenses. The vulnerability is classified under CWE-451, which relates to incorrect display of UI elements that can mislead users. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts the integrity of the system (I:H) without affecting confidentiality or availability. No known exploits in the wild have been reported to date. The vulnerability was publicly disclosed on November 1, 2022, and affects unspecified versions prior to the patched release 106.0.5249.62. The root cause is the browser's failure to correctly isolate or display security UI elements in full-screen mode, allowing malicious content to visually mimic trusted browser components.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing campaigns. Attackers exploiting this flaw could create convincing fake security indicators to deceive users into entering credentials, approving malicious transactions, or downloading malware. This risk is heightened in sectors with high reliance on web applications and sensitive data, such as finance, healthcare, and government services. The integrity of user interactions is compromised, potentially leading to unauthorized actions or data manipulation. While confidentiality and availability are not directly impacted by the vulnerability itself, the downstream effects of successful phishing or fraud could result in data breaches or operational disruptions. Since exploitation requires user interaction and the victim to be using an unpatched Chrome version in full-screen mode, the attack surface is somewhat limited but still significant given Chrome's widespread use. European organizations with remote or hybrid workforces may be particularly vulnerable if users access corporate resources via Chrome without timely updates. Additionally, the spoofing could undermine user trust in browser security indicators, complicating security awareness efforts.
Mitigation Recommendations
European organizations should prioritize updating all Google Chrome installations to version 106.0.5249.62 or later, where this vulnerability is patched. Automated patch management systems should be leveraged to ensure rapid deployment across all endpoints. User education campaigns should emphasize caution when interacting with full-screen web content and reinforce the importance of verifying URLs and security indicators, especially when prompted for sensitive information. Network-level protections such as web filtering and anti-phishing solutions can help block access to known malicious sites attempting to exploit this vulnerability. Organizations should also consider deploying browser security extensions that enhance UI integrity or alert users to suspicious page behaviors. For high-risk environments, restricting the use of full-screen mode or disabling it via group policies or browser configuration may reduce exposure. Monitoring for unusual user activity or phishing attempts can provide early detection of exploitation attempts. Finally, maintaining an up-to-date inventory of browser versions in use across the organization will aid in compliance and risk management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
CVE-2022-3313: Incorrect security UI in Google Chrome
Description
Incorrect security UI in full screen in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
AI-Powered Analysis
Technical Analysis
CVE-2022-3313 is a security vulnerability identified in Google Chrome versions prior to 106.0.5249.62. The flaw pertains to an incorrect security user interface (UI) behavior when Chrome is running in full-screen mode. Specifically, this vulnerability allows a remote attacker to craft a malicious HTML page that can spoof the browser's security UI elements. The spoofing could mislead users into believing they are interacting with legitimate browser security indicators, such as the URL bar or security status icons, when in fact they are not. This type of UI spoofing attack can facilitate phishing or social engineering attacks by tricking users into divulging sensitive information or performing unsafe actions under false pretenses. The vulnerability is classified under CWE-451, which relates to incorrect display of UI elements that can mislead users. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts the integrity of the system (I:H) without affecting confidentiality or availability. No known exploits in the wild have been reported to date. The vulnerability was publicly disclosed on November 1, 2022, and affects unspecified versions prior to the patched release 106.0.5249.62. The root cause is the browser's failure to correctly isolate or display security UI elements in full-screen mode, allowing malicious content to visually mimic trusted browser components.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing campaigns. Attackers exploiting this flaw could create convincing fake security indicators to deceive users into entering credentials, approving malicious transactions, or downloading malware. This risk is heightened in sectors with high reliance on web applications and sensitive data, such as finance, healthcare, and government services. The integrity of user interactions is compromised, potentially leading to unauthorized actions or data manipulation. While confidentiality and availability are not directly impacted by the vulnerability itself, the downstream effects of successful phishing or fraud could result in data breaches or operational disruptions. Since exploitation requires user interaction and the victim to be using an unpatched Chrome version in full-screen mode, the attack surface is somewhat limited but still significant given Chrome's widespread use. European organizations with remote or hybrid workforces may be particularly vulnerable if users access corporate resources via Chrome without timely updates. Additionally, the spoofing could undermine user trust in browser security indicators, complicating security awareness efforts.
Mitigation Recommendations
European organizations should prioritize updating all Google Chrome installations to version 106.0.5249.62 or later, where this vulnerability is patched. Automated patch management systems should be leveraged to ensure rapid deployment across all endpoints. User education campaigns should emphasize caution when interacting with full-screen web content and reinforce the importance of verifying URLs and security indicators, especially when prompted for sensitive information. Network-level protections such as web filtering and anti-phishing solutions can help block access to known malicious sites attempting to exploit this vulnerability. Organizations should also consider deploying browser security extensions that enhance UI integrity or alert users to suspicious page behaviors. For high-risk environments, restricting the use of full-screen mode or disabling it via group policies or browser configuration may reduce exposure. Monitoring for unusual user activity or phishing attempts can provide early detection of exploitation attempts. Finally, maintaining an up-to-date inventory of browser versions in use across the organization will aid in compliance and risk management.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Chrome
- Date Reserved
- 2022-09-26T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbda536
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/5/2025, 6:10:53 PM
Last updated: 8/16/2025, 4:34:25 AM
Views: 11
Related Threats
CVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumCVE-2025-9100: Authentication Bypass by Capture-replay in zhenfeng13 My-Blog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.