Skip to main content

CVE-2023-5849: Integer overflow in Google Chrome

High
VulnerabilityCVE-2023-5849cvecve-2023-5849
Published: Wed Nov 01 2023 (11/01/2023, 17:14:00 UTC)
Source: CVE
Vendor/Project: Google
Product: Chrome

Description

Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 06/22/2025, 14:49:38 UTC

Technical Analysis

CVE-2023-5849 is a high-severity integer overflow vulnerability identified in the USB handling component of Google Chrome versions prior to 119.0.6045.105. The flaw arises from improper handling of integer values within the USB subsystem, which can lead to an integer overflow condition. This overflow can subsequently cause heap corruption when a user visits a maliciously crafted HTML page that exploits this vulnerability. Heap corruption can be leveraged by attackers to execute arbitrary code, escalate privileges, or cause denial of service. The vulnerability does not require any privileges or prior authentication but does require user interaction in the form of visiting a malicious webpage. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network and low attack complexity. The vulnerability is categorized under CWE-190 (Integer Overflow or Wraparound). Although no known exploits are currently reported in the wild, the potential for remote code execution makes this a critical issue for users of affected Chrome versions. The vulnerability was publicly disclosed on November 1, 2023, and users are strongly advised to update to version 119.0.6045.105 or later where the issue is patched. Given Chrome's widespread use, this vulnerability poses a significant risk to a broad user base, especially in environments where USB device interactions are common and browsing untrusted web content is possible.

Potential Impact

For European organizations, the impact of CVE-2023-5849 can be substantial. Since Google Chrome is one of the most widely used web browsers across Europe, this vulnerability could be exploited to compromise endpoint security. Successful exploitation could lead to unauthorized access, data theft, or disruption of services through denial of service attacks. Organizations with employees who frequently interact with USB devices or visit external websites are particularly at risk. The vulnerability could be leveraged by attackers to infiltrate corporate networks, especially if combined with social engineering tactics to lure users to malicious sites. Critical sectors such as finance, healthcare, government, and critical infrastructure could face severe confidentiality breaches or operational disruptions. Additionally, the vulnerability's ability to affect all platforms running vulnerable Chrome versions increases the attack surface. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly following public disclosure.

Mitigation Recommendations

Immediately update all instances of Google Chrome to version 119.0.6045.105 or later to apply the official patch addressing this vulnerability. Implement enterprise-wide browser update policies to ensure timely deployment of security patches, minimizing the window of exposure. Restrict or monitor USB device usage within corporate environments to reduce the risk surface associated with USB-related vulnerabilities. Deploy web filtering solutions to block access to known malicious or untrusted websites, reducing the likelihood of users encountering crafted HTML pages exploiting this flaw. Utilize endpoint detection and response (EDR) tools to monitor for unusual heap corruption or memory-related anomalies indicative of exploitation attempts. Educate users about the risks of visiting untrusted websites and the importance of promptly installing browser updates. Consider implementing application sandboxing or browser isolation technologies to contain potential exploitation impacts. Regularly audit and inventory browser versions across the organization to ensure compliance with security policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2023-10-30T22:11:15.745Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee660

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/22/2025, 2:49:38 PM

Last updated: 7/26/2025, 12:03:45 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats