Skip to main content

CVE-2023-6347: Use after free in Google Chrome

High
VulnerabilityCVE-2023-6347cvecve-2023-6347
Published: Wed Nov 29 2023 (11/29/2023, 12:02:04 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 07/07/2025, 10:28:03 UTC

Technical Analysis

CVE-2023-6347 is a high-severity use-after-free vulnerability found in the Mojo component of Google Chrome versions prior to 119.0.6045.199. The vulnerability arises from improper handling of memory, where a previously freed object is accessed again, leading to heap corruption. An attacker can exploit this flaw by crafting a malicious HTML page that triggers the use-after-free condition when rendered by the vulnerable Chrome browser. This heap corruption can potentially allow remote code execution, enabling an attacker to run arbitrary code within the context of the browser process. The vulnerability does not require any privileges or prior authentication but does require user interaction in the form of visiting a malicious webpage. The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could lead to full compromise of the affected system. Although no known exploits are currently reported in the wild, the nature of the vulnerability and the widespread use of Chrome make it a significant security concern. The underlying weakness is classified under CWE-416 (Use After Free), a common and dangerous memory corruption issue. The vulnerability was publicly disclosed on November 29, 2023, and users are advised to update to Chrome version 119.0.6045.199 or later where the issue has been addressed.

Potential Impact

For European organizations, the impact of CVE-2023-6347 can be substantial due to the widespread use of Google Chrome as a primary web browser across enterprises, government agencies, and critical infrastructure sectors. Exploitation could lead to unauthorized access to sensitive data, disruption of business operations, and potential lateral movement within corporate networks if attackers gain code execution capabilities. Given the browser's role as a gateway to the internet, this vulnerability could be leveraged in targeted phishing campaigns or drive-by download attacks, increasing the risk of data breaches and espionage. The confidentiality, integrity, and availability of systems could be severely compromised, especially in sectors handling personal data under GDPR regulations, financial information, or critical operational technology. The requirement for user interaction means that social engineering or malicious advertising could be vectors for exploitation, emphasizing the need for user awareness and technical controls. Although no active exploitation is reported, the high severity and ease of exploitation make timely patching critical to prevent potential attacks.

Mitigation Recommendations

European organizations should prioritize immediate patching by upgrading all instances of Google Chrome to version 119.0.6045.199 or later. Beyond patching, organizations should implement network-level protections such as web filtering to block access to known malicious sites and employ endpoint detection and response (EDR) solutions capable of detecting anomalous browser behavior indicative of exploitation attempts. User education campaigns should be conducted to raise awareness about the risks of clicking on unknown links or visiting untrusted websites. Additionally, deploying browser isolation technologies can help contain potential exploitation by executing web content in a sandboxed environment. Organizations should also ensure that their incident response teams are prepared to detect and respond to exploitation attempts, including monitoring for unusual process behavior or memory corruption indicators. Regular vulnerability scanning and asset inventory management will help identify and remediate outdated browser versions promptly. Finally, leveraging multi-factor authentication and network segmentation can limit the impact of a successful compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Chrome
Date Reserved
2023-11-28T01:12:09.557Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6841a29c182aa0cae2e196d4

Added to database: 6/5/2025, 1:58:52 PM

Last enriched: 7/7/2025, 10:28:03 AM

Last updated: 7/29/2025, 7:39:55 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats