Skip to main content

CVE-2023-0699: Use after free in Google Chrome

High
VulnerabilityCVE-2023-0699cvecve-2023-0699
Published: Tue Feb 07 2023 (02/07/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: Google
Product: Chrome

Description

Use after free in GPU in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page and browser shutdown. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 07/03/2025, 12:12:25 UTC

Technical Analysis

CVE-2023-0699 is a high-severity use-after-free vulnerability affecting the GPU component of Google Chrome versions prior to 110.0.5481.77. The flaw arises from improper memory management in the GPU process, where a use-after-free condition can be triggered by a crafted HTML page combined with a browser shutdown sequence. This vulnerability allows a remote attacker to exploit heap corruption, potentially leading to arbitrary code execution within the context of the browser. The vulnerability is classified under CWE-416 (Use After Free), indicating that the application continues to use memory after it has been freed, which can corrupt the program state or lead to execution of malicious code. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector that requires no privileges but does require user interaction (visiting a malicious webpage). The scope is unchanged, meaning the impact is confined to the vulnerable component within the same security scope. Although no known exploits are reported in the wild as of the publication date, the severity and ease of exploitation make this a critical issue for users running affected Chrome versions. The lack of a direct patch link in the provided data suggests that users should update to Chrome 110.0.5481.77 or later, where this vulnerability has been addressed.

Potential Impact

For European organizations, this vulnerability poses significant risks due to the widespread use of Google Chrome as a primary web browser across enterprises and public institutions. Exploitation could lead to unauthorized code execution, enabling attackers to steal sensitive data, install malware, or disrupt services. Given the GPU process is involved, exploitation might bypass some traditional sandboxing mechanisms, increasing the risk of privilege escalation or persistent compromise. Organizations handling sensitive personal data under GDPR could face compliance issues and reputational damage if breaches occur. Additionally, sectors such as finance, government, healthcare, and critical infrastructure in Europe rely heavily on Chrome, making them attractive targets. The requirement for user interaction (visiting a malicious webpage) means phishing or drive-by download attacks could be vectors, emphasizing the need for user awareness and technical controls. The absence of known exploits in the wild currently provides a window for proactive mitigation before active exploitation emerges.

Mitigation Recommendations

European organizations should prioritize updating all Chrome installations to version 110.0.5481.77 or later immediately to remediate this vulnerability. Beyond patching, organizations should implement network-level protections such as web filtering to block access to known malicious sites and employ endpoint detection and response (EDR) solutions to monitor for suspicious browser behavior indicative of exploitation attempts. User education campaigns should reinforce the risks of interacting with untrusted web content and phishing emails. Additionally, enabling Chrome's built-in security features like Site Isolation and strict sandboxing can reduce the impact of potential exploitation. For high-security environments, consider deploying application allowlisting and restricting GPU process privileges where feasible. Regular vulnerability scanning and penetration testing should include checks for outdated browser versions to ensure compliance. Finally, maintaining robust incident response plans will help quickly contain any potential breaches resulting from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2023-02-06T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc44a

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:12:25 PM

Last updated: 8/18/2025, 12:32:20 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats