CVE-2023-2722: Use after free in Google Chrome
Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
AI Analysis
Technical Summary
CVE-2023-2722 is a high-severity use-after-free vulnerability affecting the Autofill UI component in Google Chrome on Android devices prior to version 113.0.5672.126. The vulnerability arises from improper memory management where the Autofill UI attempts to access memory that has already been freed, leading to heap corruption. An attacker can exploit this flaw by crafting a malicious HTML page that triggers the use-after-free condition when loaded in the vulnerable Chrome browser. This can result in arbitrary code execution, allowing the attacker to compromise the confidentiality, integrity, and availability of the affected device. The vulnerability does not require any privileges and can be triggered remotely via a web page, but it does require user interaction to visit the malicious page. The CVSS v3.1 base score is 8.8, reflecting the critical impact and ease of exploitation. Although no known exploits are currently reported in the wild, the nature of the vulnerability and its presence in a widely used browser make it a significant threat. The vulnerability is categorized under CWE-416 (Use After Free), a common and dangerous memory corruption issue. Since Chrome is a widely used browser on Android devices, this vulnerability potentially affects a large user base until patched.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those with employees or users relying on Android devices with Chrome browsers. Exploitation could lead to unauthorized access to sensitive corporate data, credential theft, or deployment of malware within corporate networks. Given the widespread use of Chrome on Android in Europe, including in sectors such as finance, healthcare, and government, the potential for data breaches and operational disruption is high. The vulnerability could be leveraged as an initial attack vector in targeted campaigns or broader phishing attacks, increasing the risk of lateral movement within corporate environments. Additionally, the compromise of mobile devices could undermine multi-factor authentication mechanisms or expose VPN credentials, further escalating the threat. The absence of known exploits currently does not diminish the urgency, as attackers may develop exploits rapidly once the vulnerability details are public. Organizations with Bring Your Own Device (BYOD) policies are particularly vulnerable, as they have less control over patching and device security.
Mitigation Recommendations
European organizations should prioritize updating all Chrome browsers on Android devices to version 113.0.5672.126 or later immediately to remediate the vulnerability. Beyond patching, organizations should implement mobile device management (MDM) solutions to enforce timely updates and restrict installation of untrusted applications. User education campaigns should emphasize the risks of visiting untrusted websites and clicking on suspicious links, reducing the likelihood of successful exploitation. Network-level protections such as web filtering and intrusion detection systems can help block access to known malicious URLs. Organizations should also monitor for unusual device behavior indicative of exploitation attempts, including unexpected crashes or anomalous network traffic. For high-risk environments, consider restricting the use of Android devices for sensitive operations until patches are applied. Finally, maintain an inventory of devices and browser versions to ensure compliance with security policies and facilitate rapid response to emerging threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2023-2722: Use after free in Google Chrome
Description
Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
AI-Powered Analysis
Technical Analysis
CVE-2023-2722 is a high-severity use-after-free vulnerability affecting the Autofill UI component in Google Chrome on Android devices prior to version 113.0.5672.126. The vulnerability arises from improper memory management where the Autofill UI attempts to access memory that has already been freed, leading to heap corruption. An attacker can exploit this flaw by crafting a malicious HTML page that triggers the use-after-free condition when loaded in the vulnerable Chrome browser. This can result in arbitrary code execution, allowing the attacker to compromise the confidentiality, integrity, and availability of the affected device. The vulnerability does not require any privileges and can be triggered remotely via a web page, but it does require user interaction to visit the malicious page. The CVSS v3.1 base score is 8.8, reflecting the critical impact and ease of exploitation. Although no known exploits are currently reported in the wild, the nature of the vulnerability and its presence in a widely used browser make it a significant threat. The vulnerability is categorized under CWE-416 (Use After Free), a common and dangerous memory corruption issue. Since Chrome is a widely used browser on Android devices, this vulnerability potentially affects a large user base until patched.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those with employees or users relying on Android devices with Chrome browsers. Exploitation could lead to unauthorized access to sensitive corporate data, credential theft, or deployment of malware within corporate networks. Given the widespread use of Chrome on Android in Europe, including in sectors such as finance, healthcare, and government, the potential for data breaches and operational disruption is high. The vulnerability could be leveraged as an initial attack vector in targeted campaigns or broader phishing attacks, increasing the risk of lateral movement within corporate environments. Additionally, the compromise of mobile devices could undermine multi-factor authentication mechanisms or expose VPN credentials, further escalating the threat. The absence of known exploits currently does not diminish the urgency, as attackers may develop exploits rapidly once the vulnerability details are public. Organizations with Bring Your Own Device (BYOD) policies are particularly vulnerable, as they have less control over patching and device security.
Mitigation Recommendations
European organizations should prioritize updating all Chrome browsers on Android devices to version 113.0.5672.126 or later immediately to remediate the vulnerability. Beyond patching, organizations should implement mobile device management (MDM) solutions to enforce timely updates and restrict installation of untrusted applications. User education campaigns should emphasize the risks of visiting untrusted websites and clicking on suspicious links, reducing the likelihood of successful exploitation. Network-level protections such as web filtering and intrusion detection systems can help block access to known malicious URLs. Organizations should also monitor for unusual device behavior indicative of exploitation attempts, including unexpected crashes or anomalous network traffic. For high-risk environments, consider restricting the use of Android devices for sensitive operations until patches are applied. Finally, maintain an inventory of devices and browser versions to ensure compliance with security policies and facilitate rapid response to emerging threats.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Chrome
- Date Reserved
- 2023-05-15T21:16:58.051Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc59f
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/3/2025, 12:43:14 PM
Last updated: 7/30/2025, 10:35:24 PM
Views: 16
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.