Skip to main content

CVE-2023-5346: Type Confusion in Google Chrome

High
VulnerabilityCVE-2023-5346cvecve-2023-5346
Published: Thu Oct 05 2023 (10/05/2023, 17:13:03 UTC)
Source: CVE
Vendor/Project: Google
Product: Chrome

Description

Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 07/03/2025, 07:41:46 UTC

Technical Analysis

CVE-2023-5346 is a high-severity vulnerability identified in the V8 JavaScript engine used by Google Chrome versions prior to 117.0.5938.149. The vulnerability is classified as a type confusion flaw (CWE-843), which occurs when the program mistakenly treats a piece of memory as a different type than it actually is. This can lead to heap corruption, allowing an attacker to manipulate memory in unintended ways. Exploiting this vulnerability requires an attacker to craft a malicious HTML page that, when loaded by a victim's browser, triggers the type confusion bug in V8. The consequence of successful exploitation includes potential arbitrary code execution, compromising the confidentiality, integrity, and availability of the affected system. The CVSS v3.1 score of 8.8 reflects the high impact and ease of exploitation, as the attack vector is network-based (via web browsing), requires no privileges, but does require user interaction (visiting a malicious or compromised website). Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a significant risk, especially given Chrome's widespread use. The vulnerability affects all Chrome installations before the patched version 117.0.5938.149, emphasizing the importance of timely updates.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the extensive use of Google Chrome as a primary web browser across enterprises, government agencies, and critical infrastructure sectors. Successful exploitation could lead to unauthorized access to sensitive data, disruption of business operations, and potential lateral movement within networks. Given the high confidentiality, integrity, and availability impacts, attackers could execute arbitrary code, install malware, or exfiltrate data. This is particularly concerning for sectors handling sensitive personal data under GDPR, financial institutions, and critical infrastructure operators. The requirement for user interaction (visiting a malicious webpage) means phishing or drive-by download attacks could be vectors, which are common in targeted attacks against European entities. The absence of known exploits in the wild currently provides a window for mitigation, but the high severity score suggests that threat actors may develop exploits rapidly.

Mitigation Recommendations

European organizations should prioritize immediate patching of all Google Chrome installations to version 117.0.5938.149 or later. Beyond patching, organizations should implement robust web filtering to block access to known malicious sites and employ endpoint protection solutions capable of detecting anomalous browser behavior indicative of exploitation attempts. User awareness training should be enhanced to reduce the risk of users visiting suspicious links or websites. Network segmentation can limit the impact of a compromised endpoint. Additionally, deploying browser isolation technologies can reduce exposure by executing web content in a controlled environment. Monitoring network traffic for unusual outbound connections and employing intrusion detection systems tuned for browser exploit indicators can provide early warning. Regular vulnerability scanning and asset inventory to ensure all Chrome instances are updated is critical. Organizations should also review and tighten browser security settings, such as disabling unnecessary plugins and enforcing strict content security policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2023-10-03T04:18:55.312Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec380

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 7/3/2025, 7:41:46 AM

Last updated: 7/29/2025, 9:59:40 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats