Skip to main content

CVE-2023-0128: Use after free in Google Chrome

High
VulnerabilityCVE-2023-0128cvecve-2023-0128
Published: Tue Jan 10 2023 (01/10/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: Google
Product: Chrome

Description

Use after free in Overview Mode in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 07/03/2025, 12:00:53 UTC

Technical Analysis

CVE-2023-0128 is a high-severity use-after-free vulnerability identified in the Overview Mode feature of Google Chrome on Chrome OS versions prior to 109.0.5414.74. This vulnerability arises from improper memory management where a previously freed object is accessed, leading to heap corruption. Exploitation requires a remote attacker to convince a user to interact with a specifically crafted HTML page that triggers the vulnerability through certain UI interactions. The vulnerability is classified under CWE-416 (Use After Free), which can lead to arbitrary code execution or denial of service. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning successful exploitation could allow full compromise of the affected system. Although no known exploits in the wild have been reported at the time of publication, the vulnerability's nature and severity make it a critical concern for Chrome OS users. No specific patch links were provided, but updating Chrome OS to version 109.0.5414.74 or later is implied as the remediation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those relying on Chrome OS devices for daily operations, including government agencies, educational institutions, and enterprises with remote or mobile workforces. Successful exploitation could lead to unauthorized access, data theft, or disruption of services. Given the high confidentiality, integrity, and availability impacts, attackers could execute arbitrary code, potentially implant persistent malware or ransomware, or cause system crashes leading to operational downtime. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users into triggering the exploit. This elevates the risk in environments where users may not be fully trained on security awareness. Additionally, sectors handling sensitive personal data under GDPR regulations could face compliance and legal consequences if breaches occur due to this vulnerability.

Mitigation Recommendations

European organizations should prioritize updating all Chrome OS devices to version 109.0.5414.74 or later as soon as possible to remediate this vulnerability. Until updates are applied, organizations should implement strict endpoint security controls such as disabling or restricting access to Overview Mode if feasible, and enforcing policies that limit the execution of untrusted or unknown HTML content. User awareness training should be enhanced to educate users about the risks of interacting with suspicious web pages and phishing attempts. Network-level protections like web filtering and intrusion prevention systems can help block access to malicious sites hosting crafted HTML pages. Additionally, organizations should monitor Chrome OS devices for unusual behavior or crashes that might indicate exploitation attempts. Incident response plans should be reviewed and updated to address potential exploitation scenarios involving Chrome OS devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2023-01-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc3cf

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:00:53 PM

Last updated: 8/4/2025, 12:00:16 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats