Skip to main content

CVE-2023-0136: Inappropriate implementation in Google Chrome

High
VulnerabilityCVE-2023-0136cvecve-2023-0136
Published: Tue Jan 10 2023 (01/10/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to execute incorrect security UI via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 07/03/2025, 12:10:29 UTC

Technical Analysis

CVE-2023-0136 is a high-severity vulnerability found in the Fullscreen API implementation of Google Chrome on Android versions prior to 109.0.5414.74. The vulnerability arises due to an inappropriate implementation that allows a remote attacker to manipulate the security user interface (UI) via a crafted HTML page. Specifically, this flaw can cause Chrome to display incorrect or misleading security indicators when a webpage enters fullscreen mode. This can trick users into believing they are interacting with a trusted or secure site when they are not, potentially facilitating phishing attacks or other social engineering exploits. The vulnerability is exploitable remotely without requiring any privileges or authentication, but it does require user interaction to trigger the fullscreen mode. The CVSS v3.1 base score is 8.8, indicating a high severity level, with metrics reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential for misuse is significant given the widespread use of Chrome on Android devices and the critical role of UI security indicators in user trust and security decisions.

Potential Impact

For European organizations, this vulnerability poses a considerable risk, especially those relying heavily on Chrome for Android as a primary browser for employees and customers. The manipulation of security UI can lead to successful phishing campaigns, credential theft, and unauthorized access to sensitive information. This is particularly concerning for sectors such as finance, healthcare, and government, where data confidentiality and integrity are paramount. The vulnerability could also be exploited to distribute malware or ransomware by misleading users into granting permissions or downloading malicious content. Given the high adoption rate of Android devices and Chrome browser in Europe, the threat surface is broad. Additionally, organizations with mobile-first strategies or those supporting remote workforces are at increased risk. The impact extends beyond direct data breaches to reputational damage and regulatory consequences under GDPR if personal data is compromised due to exploitation of this vulnerability.

Mitigation Recommendations

European organizations should prioritize updating Google Chrome on all Android devices to version 109.0.5414.74 or later, where the vulnerability is patched. Mobile device management (MDM) solutions can be leveraged to enforce browser updates and restrict installation of outdated versions. Security awareness training should emphasize caution when interacting with fullscreen prompts and encourage verification of site authenticity before granting fullscreen permissions. Implementing advanced phishing detection tools and browser security extensions that monitor UI anomalies can provide additional protection. Network-level controls such as web filtering and DNS security can help block access to known malicious sites exploiting this vulnerability. Organizations should also monitor threat intelligence feeds for any emerging exploits related to CVE-2023-0136 and be prepared to respond swiftly. Finally, conducting regular security assessments and penetration testing on mobile platforms can help identify residual risks related to browser vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2023-01-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc3f8

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:10:29 PM

Last updated: 7/30/2025, 9:04:39 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats