CVE-2023-0136: Inappropriate implementation in Google Chrome
Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to execute incorrect security UI via a crafted HTML page. (Chromium security severity: Medium)
AI Analysis
Technical Summary
CVE-2023-0136 is a high-severity vulnerability found in the Fullscreen API implementation of Google Chrome on Android versions prior to 109.0.5414.74. The vulnerability arises due to an inappropriate implementation that allows a remote attacker to manipulate the security user interface (UI) via a crafted HTML page. Specifically, this flaw can cause Chrome to display incorrect or misleading security indicators when a webpage enters fullscreen mode. This can trick users into believing they are interacting with a trusted or secure site when they are not, potentially facilitating phishing attacks or other social engineering exploits. The vulnerability is exploitable remotely without requiring any privileges or authentication, but it does require user interaction to trigger the fullscreen mode. The CVSS v3.1 base score is 8.8, indicating a high severity level, with metrics reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential for misuse is significant given the widespread use of Chrome on Android devices and the critical role of UI security indicators in user trust and security decisions.
Potential Impact
For European organizations, this vulnerability poses a considerable risk, especially those relying heavily on Chrome for Android as a primary browser for employees and customers. The manipulation of security UI can lead to successful phishing campaigns, credential theft, and unauthorized access to sensitive information. This is particularly concerning for sectors such as finance, healthcare, and government, where data confidentiality and integrity are paramount. The vulnerability could also be exploited to distribute malware or ransomware by misleading users into granting permissions or downloading malicious content. Given the high adoption rate of Android devices and Chrome browser in Europe, the threat surface is broad. Additionally, organizations with mobile-first strategies or those supporting remote workforces are at increased risk. The impact extends beyond direct data breaches to reputational damage and regulatory consequences under GDPR if personal data is compromised due to exploitation of this vulnerability.
Mitigation Recommendations
European organizations should prioritize updating Google Chrome on all Android devices to version 109.0.5414.74 or later, where the vulnerability is patched. Mobile device management (MDM) solutions can be leveraged to enforce browser updates and restrict installation of outdated versions. Security awareness training should emphasize caution when interacting with fullscreen prompts and encourage verification of site authenticity before granting fullscreen permissions. Implementing advanced phishing detection tools and browser security extensions that monitor UI anomalies can provide additional protection. Network-level controls such as web filtering and DNS security can help block access to known malicious sites exploiting this vulnerability. Organizations should also monitor threat intelligence feeds for any emerging exploits related to CVE-2023-0136 and be prepared to respond swiftly. Finally, conducting regular security assessments and penetration testing on mobile platforms can help identify residual risks related to browser vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2023-0136: Inappropriate implementation in Google Chrome
Description
Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to execute incorrect security UI via a crafted HTML page. (Chromium security severity: Medium)
AI-Powered Analysis
Technical Analysis
CVE-2023-0136 is a high-severity vulnerability found in the Fullscreen API implementation of Google Chrome on Android versions prior to 109.0.5414.74. The vulnerability arises due to an inappropriate implementation that allows a remote attacker to manipulate the security user interface (UI) via a crafted HTML page. Specifically, this flaw can cause Chrome to display incorrect or misleading security indicators when a webpage enters fullscreen mode. This can trick users into believing they are interacting with a trusted or secure site when they are not, potentially facilitating phishing attacks or other social engineering exploits. The vulnerability is exploitable remotely without requiring any privileges or authentication, but it does require user interaction to trigger the fullscreen mode. The CVSS v3.1 base score is 8.8, indicating a high severity level, with metrics reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential for misuse is significant given the widespread use of Chrome on Android devices and the critical role of UI security indicators in user trust and security decisions.
Potential Impact
For European organizations, this vulnerability poses a considerable risk, especially those relying heavily on Chrome for Android as a primary browser for employees and customers. The manipulation of security UI can lead to successful phishing campaigns, credential theft, and unauthorized access to sensitive information. This is particularly concerning for sectors such as finance, healthcare, and government, where data confidentiality and integrity are paramount. The vulnerability could also be exploited to distribute malware or ransomware by misleading users into granting permissions or downloading malicious content. Given the high adoption rate of Android devices and Chrome browser in Europe, the threat surface is broad. Additionally, organizations with mobile-first strategies or those supporting remote workforces are at increased risk. The impact extends beyond direct data breaches to reputational damage and regulatory consequences under GDPR if personal data is compromised due to exploitation of this vulnerability.
Mitigation Recommendations
European organizations should prioritize updating Google Chrome on all Android devices to version 109.0.5414.74 or later, where the vulnerability is patched. Mobile device management (MDM) solutions can be leveraged to enforce browser updates and restrict installation of outdated versions. Security awareness training should emphasize caution when interacting with fullscreen prompts and encourage verification of site authenticity before granting fullscreen permissions. Implementing advanced phishing detection tools and browser security extensions that monitor UI anomalies can provide additional protection. Network-level controls such as web filtering and DNS security can help block access to known malicious sites exploiting this vulnerability. Organizations should also monitor threat intelligence feeds for any emerging exploits related to CVE-2023-0136 and be prepared to respond swiftly. Finally, conducting regular security assessments and penetration testing on mobile platforms can help identify residual risks related to browser vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Chrome
- Date Reserved
- 2023-01-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc3f8
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/3/2025, 12:10:29 PM
Last updated: 10/15/2025, 8:26:06 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighCVE-2025-43313: An app may be able to access sensitive user data in Apple macOS
UnknownCVE-2025-43282: An app may be able to cause unexpected system termination in Apple iPadOS
UnknownCVE-2025-43281: A local attacker may be able to elevate their privileges in Apple macOS
UnknownCVE-2025-43280: Forwarding an email could display remote images in Mail in Lockdown Mode in Apple iOS and iPadOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.