CVE-2022-3075
high-risk
Published 2022-09-26
Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Do I need to act?
~
2.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.6/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (9)
Permissions Required
https://crbug.com/1358134
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro...
Third Party Advisory
https://security.gentoo.org/glsa/202209-23
Permissions Required
https://crbug.com/1358134
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro...
Third Party Advisory
https://security.gentoo.org/glsa/202209-23
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-...
51
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
12/34 · Low
Exposure
7/34 · Low