Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-3313: Incorrect security UI in Google Chrome

0
Medium
VulnerabilityCVE-2022-3313cvecve-2022-3313
Published: Tue Nov 01 2022 (11/01/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Google
Product: Chrome

Description

Incorrect security UI in full screen in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 07/05/2025, 18:10:53 UTC

Technical Analysis

CVE-2022-3313 is a security vulnerability identified in Google Chrome versions prior to 106.0.5249.62. The flaw pertains to an incorrect security user interface (UI) behavior when Chrome is running in full-screen mode. Specifically, this vulnerability allows a remote attacker to craft a malicious HTML page that can spoof the browser's security UI elements. The spoofing could mislead users into believing they are interacting with legitimate browser security indicators, such as the URL bar or security status icons, when in fact they are not. This type of UI spoofing attack can facilitate phishing or social engineering attacks by tricking users into divulging sensitive information or performing unsafe actions under false pretenses. The vulnerability is classified under CWE-451, which relates to incorrect display of UI elements that can mislead users. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts the integrity of the system (I:H) without affecting confidentiality or availability. No known exploits in the wild have been reported to date. The vulnerability was publicly disclosed on November 1, 2022, and affects unspecified versions prior to the patched release 106.0.5249.62. The root cause is the browser's failure to correctly isolate or display security UI elements in full-screen mode, allowing malicious content to visually mimic trusted browser components.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing campaigns. Attackers exploiting this flaw could create convincing fake security indicators to deceive users into entering credentials, approving malicious transactions, or downloading malware. This risk is heightened in sectors with high reliance on web applications and sensitive data, such as finance, healthcare, and government services. The integrity of user interactions is compromised, potentially leading to unauthorized actions or data manipulation. While confidentiality and availability are not directly impacted by the vulnerability itself, the downstream effects of successful phishing or fraud could result in data breaches or operational disruptions. Since exploitation requires user interaction and the victim to be using an unpatched Chrome version in full-screen mode, the attack surface is somewhat limited but still significant given Chrome's widespread use. European organizations with remote or hybrid workforces may be particularly vulnerable if users access corporate resources via Chrome without timely updates. Additionally, the spoofing could undermine user trust in browser security indicators, complicating security awareness efforts.

Mitigation Recommendations

European organizations should prioritize updating all Google Chrome installations to version 106.0.5249.62 or later, where this vulnerability is patched. Automated patch management systems should be leveraged to ensure rapid deployment across all endpoints. User education campaigns should emphasize caution when interacting with full-screen web content and reinforce the importance of verifying URLs and security indicators, especially when prompted for sensitive information. Network-level protections such as web filtering and anti-phishing solutions can help block access to known malicious sites attempting to exploit this vulnerability. Organizations should also consider deploying browser security extensions that enhance UI integrity or alert users to suspicious page behaviors. For high-risk environments, restricting the use of full-screen mode or disabling it via group policies or browser configuration may reduce exposure. Monitoring for unusual user activity or phishing attempts can provide early detection of exploitation attempts. Finally, maintaining an up-to-date inventory of browser versions in use across the organization will aid in compliance and risk management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2022-09-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda536

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 6:10:53 PM

Last updated: 2/7/2026, 3:10:42 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats