Skip to main content

CVE-2023-2722: Use after free in Google Chrome

High
VulnerabilityCVE-2023-2722cvecve-2023-2722
Published: Tue May 16 2023 (05/16/2023, 18:45:33 UTC)
Source: CVE
Vendor/Project: Google
Product: Chrome

Description

Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 07/03/2025, 12:43:14 UTC

Technical Analysis

CVE-2023-2722 is a high-severity use-after-free vulnerability affecting the Autofill UI component in Google Chrome on Android devices prior to version 113.0.5672.126. The vulnerability arises from improper memory management where the Autofill UI attempts to access memory that has already been freed, leading to heap corruption. An attacker can exploit this flaw by crafting a malicious HTML page that triggers the use-after-free condition when loaded in the vulnerable Chrome browser. This can result in arbitrary code execution, allowing the attacker to compromise the confidentiality, integrity, and availability of the affected device. The vulnerability does not require any privileges and can be triggered remotely via a web page, but it does require user interaction to visit the malicious page. The CVSS v3.1 base score is 8.8, reflecting the critical impact and ease of exploitation. Although no known exploits are currently reported in the wild, the nature of the vulnerability and its presence in a widely used browser make it a significant threat. The vulnerability is categorized under CWE-416 (Use After Free), a common and dangerous memory corruption issue. Since Chrome is a widely used browser on Android devices, this vulnerability potentially affects a large user base until patched.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those with employees or users relying on Android devices with Chrome browsers. Exploitation could lead to unauthorized access to sensitive corporate data, credential theft, or deployment of malware within corporate networks. Given the widespread use of Chrome on Android in Europe, including in sectors such as finance, healthcare, and government, the potential for data breaches and operational disruption is high. The vulnerability could be leveraged as an initial attack vector in targeted campaigns or broader phishing attacks, increasing the risk of lateral movement within corporate environments. Additionally, the compromise of mobile devices could undermine multi-factor authentication mechanisms or expose VPN credentials, further escalating the threat. The absence of known exploits currently does not diminish the urgency, as attackers may develop exploits rapidly once the vulnerability details are public. Organizations with Bring Your Own Device (BYOD) policies are particularly vulnerable, as they have less control over patching and device security.

Mitigation Recommendations

European organizations should prioritize updating all Chrome browsers on Android devices to version 113.0.5672.126 or later immediately to remediate the vulnerability. Beyond patching, organizations should implement mobile device management (MDM) solutions to enforce timely updates and restrict installation of untrusted applications. User education campaigns should emphasize the risks of visiting untrusted websites and clicking on suspicious links, reducing the likelihood of successful exploitation. Network-level protections such as web filtering and intrusion detection systems can help block access to known malicious URLs. Organizations should also monitor for unusual device behavior indicative of exploitation attempts, including unexpected crashes or anomalous network traffic. For high-risk environments, consider restricting the use of Android devices for sensitive operations until patches are applied. Finally, maintain an inventory of devices and browser versions to ensure compliance with security policies and facilitate rapid response to emerging threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2023-05-15T21:16:58.051Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc59f

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/3/2025, 12:43:14 PM

Last updated: 7/30/2025, 10:35:24 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats