Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4863: Heap buffer overflow in Google Chrome

0
High
VulnerabilityCVE-2023-4863cvecve-2023-4863
Published: Tue Sep 12 2023 (09/12/2023, 14:24:59 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

AI-Powered Analysis

AILast updated: 10/21/2025, 20:02:42 UTC

Technical Analysis

CVE-2023-4863 is a heap buffer overflow vulnerability identified in the libwebp library integrated within Google Chrome versions prior to 116.0.5845.187. Libwebp is responsible for decoding WebP image formats, which are widely used on the web for efficient image compression. The vulnerability arises from improper bounds checking during the processing of crafted WebP images embedded in HTML pages, leading to an out-of-bounds memory write on the heap. This type of memory corruption can be exploited by remote attackers to execute arbitrary code, escalate privileges, or cause denial of service by crashing the browser. The attack vector is remote and requires no prior authentication, but does require user interaction, such as visiting a malicious or compromised website that serves the crafted WebP image. The vulnerability is tracked under CWE-787 (Out-of-bounds Write) and has been assigned a CVSS v3.1 base score of 8.8, indicating high severity with impacts on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the critical nature of the flaw and the widespread use of Chrome make it a significant security concern. Google has addressed the issue in Chrome version 116.0.5845.187, and users are strongly advised to update to this or later versions to mitigate the risk. The vulnerability's exploitation could lead to remote code execution within the browser context, potentially allowing attackers to bypass sandbox protections and compromise user data or system integrity.

Potential Impact

For European organizations, the impact of CVE-2023-4863 is considerable due to the widespread adoption of Google Chrome as the primary web browser. Successful exploitation could lead to arbitrary code execution, enabling attackers to steal sensitive information, install malware, or disrupt services. This is particularly critical for sectors such as finance, government, healthcare, and critical infrastructure, where data confidentiality and system integrity are paramount. The vulnerability could be leveraged in targeted phishing campaigns or drive-by downloads, increasing the risk of widespread compromise. Additionally, the potential for denial of service could disrupt business operations. Given the remote attack vector and lack of authentication requirements, the threat surface is broad, affecting any user who accesses malicious content via vulnerable Chrome versions. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for patching, as threat actors may develop exploits rapidly following public disclosure.

Mitigation Recommendations

1. Immediate update of all Google Chrome installations to version 116.0.5845.187 or later to apply the official patch addressing the vulnerability. 2. Implement network-level filtering to block or inspect WebP image traffic from untrusted sources, potentially using advanced web proxies or secure web gateways capable of content inspection. 3. Employ endpoint protection solutions with behavior-based detection to identify and block exploitation attempts targeting browser vulnerabilities. 4. Educate users on the risks of visiting untrusted websites and opening suspicious links, emphasizing the importance of cautious browsing behavior. 5. Monitor security advisories and threat intelligence feeds for any emerging exploit attempts related to CVE-2023-4863. 6. Consider deploying browser isolation technologies for high-risk users or environments to contain potential exploitation impacts. 7. Regularly audit and inventory browser versions across the organization to ensure compliance with patching policies. 8. Coordinate with IT and security teams to integrate vulnerability management processes that prioritize critical browser vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2023-09-09T01:02:58.312Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9ae247d717aace267b6

Added to database: 10/21/2025, 7:06:22 PM

Last enriched: 10/21/2025, 8:02:42 PM

Last updated: 10/30/2025, 2:17:04 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.