CVE-2023-5849: Integer overflow in Google Chrome
Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
AI Analysis
Technical Summary
CVE-2023-5849 is a high-severity integer overflow vulnerability identified in the USB handling component of Google Chrome versions prior to 119.0.6045.105. The flaw arises from improper handling of integer values within the USB subsystem, which can lead to an integer overflow condition. This overflow can subsequently cause heap corruption when a user visits a maliciously crafted HTML page that exploits this vulnerability. Heap corruption can be leveraged by attackers to execute arbitrary code, escalate privileges, or cause denial of service. The vulnerability does not require any privileges or prior authentication but does require user interaction in the form of visiting a malicious webpage. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network and low attack complexity. The vulnerability is categorized under CWE-190 (Integer Overflow or Wraparound). Although no known exploits are currently reported in the wild, the potential for remote code execution makes this a critical issue for users of affected Chrome versions. The vulnerability was publicly disclosed on November 1, 2023, and users are strongly advised to update to version 119.0.6045.105 or later where the issue is patched. Given Chrome's widespread use, this vulnerability poses a significant risk to a broad user base, especially in environments where USB device interactions are common and browsing untrusted web content is possible.
Potential Impact
For European organizations, the impact of CVE-2023-5849 can be substantial. Since Google Chrome is one of the most widely used web browsers across Europe, this vulnerability could be exploited to compromise endpoint security. Successful exploitation could lead to unauthorized access, data theft, or disruption of services through denial of service attacks. Organizations with employees who frequently interact with USB devices or visit external websites are particularly at risk. The vulnerability could be leveraged by attackers to infiltrate corporate networks, especially if combined with social engineering tactics to lure users to malicious sites. Critical sectors such as finance, healthcare, government, and critical infrastructure could face severe confidentiality breaches or operational disruptions. Additionally, the vulnerability's ability to affect all platforms running vulnerable Chrome versions increases the attack surface. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly following public disclosure.
Mitigation Recommendations
Immediately update all instances of Google Chrome to version 119.0.6045.105 or later to apply the official patch addressing this vulnerability. Implement enterprise-wide browser update policies to ensure timely deployment of security patches, minimizing the window of exposure. Restrict or monitor USB device usage within corporate environments to reduce the risk surface associated with USB-related vulnerabilities. Deploy web filtering solutions to block access to known malicious or untrusted websites, reducing the likelihood of users encountering crafted HTML pages exploiting this flaw. Utilize endpoint detection and response (EDR) tools to monitor for unusual heap corruption or memory-related anomalies indicative of exploitation attempts. Educate users about the risks of visiting untrusted websites and the importance of promptly installing browser updates. Consider implementing application sandboxing or browser isolation technologies to contain potential exploitation impacts. Regularly audit and inventory browser versions across the organization to ensure compliance with security policies.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
CVE-2023-5849: Integer overflow in Google Chrome
Description
Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
AI-Powered Analysis
Technical Analysis
CVE-2023-5849 is a high-severity integer overflow vulnerability identified in the USB handling component of Google Chrome versions prior to 119.0.6045.105. The flaw arises from improper handling of integer values within the USB subsystem, which can lead to an integer overflow condition. This overflow can subsequently cause heap corruption when a user visits a maliciously crafted HTML page that exploits this vulnerability. Heap corruption can be leveraged by attackers to execute arbitrary code, escalate privileges, or cause denial of service. The vulnerability does not require any privileges or prior authentication but does require user interaction in the form of visiting a malicious webpage. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network and low attack complexity. The vulnerability is categorized under CWE-190 (Integer Overflow or Wraparound). Although no known exploits are currently reported in the wild, the potential for remote code execution makes this a critical issue for users of affected Chrome versions. The vulnerability was publicly disclosed on November 1, 2023, and users are strongly advised to update to version 119.0.6045.105 or later where the issue is patched. Given Chrome's widespread use, this vulnerability poses a significant risk to a broad user base, especially in environments where USB device interactions are common and browsing untrusted web content is possible.
Potential Impact
For European organizations, the impact of CVE-2023-5849 can be substantial. Since Google Chrome is one of the most widely used web browsers across Europe, this vulnerability could be exploited to compromise endpoint security. Successful exploitation could lead to unauthorized access, data theft, or disruption of services through denial of service attacks. Organizations with employees who frequently interact with USB devices or visit external websites are particularly at risk. The vulnerability could be leveraged by attackers to infiltrate corporate networks, especially if combined with social engineering tactics to lure users to malicious sites. Critical sectors such as finance, healthcare, government, and critical infrastructure could face severe confidentiality breaches or operational disruptions. Additionally, the vulnerability's ability to affect all platforms running vulnerable Chrome versions increases the attack surface. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly following public disclosure.
Mitigation Recommendations
Immediately update all instances of Google Chrome to version 119.0.6045.105 or later to apply the official patch addressing this vulnerability. Implement enterprise-wide browser update policies to ensure timely deployment of security patches, minimizing the window of exposure. Restrict or monitor USB device usage within corporate environments to reduce the risk surface associated with USB-related vulnerabilities. Deploy web filtering solutions to block access to known malicious or untrusted websites, reducing the likelihood of users encountering crafted HTML pages exploiting this flaw. Utilize endpoint detection and response (EDR) tools to monitor for unusual heap corruption or memory-related anomalies indicative of exploitation attempts. Educate users about the risks of visiting untrusted websites and the importance of promptly installing browser updates. Consider implementing application sandboxing or browser isolation technologies to contain potential exploitation impacts. Regularly audit and inventory browser versions across the organization to ensure compliance with security policies.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Chrome
- Date Reserved
- 2023-10-30T22:11:15.745Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbee660
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/22/2025, 2:49:38 PM
Last updated: 7/26/2025, 12:03:45 PM
Views: 12
Related Threats
CVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.