CVE-2022-1869
vulnerability analysis and mitigation

Overview

Type Confusion in V8 in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. The vulnerability was discovered and reported by Man Yue Mo of GitHub Security Lab on March 23, 2022, and was fixed in Chrome version 102.0.5005.61 released on May 24, 2022 (Chrome Release, GitHub Lab).

Technical details

The vulnerability is a type confusion issue in V8, Chrome's JavaScript engine, specifically in the handling of accessor in ReduceNamedAccess. The bug occurs when a lookupstartobject that passes the LookupHolderOfExpectedType test is provided along with a receiver of a different type, leading to type confusion. The issue manifests in the AccessorAccessInfoHelper where map compatibility is checked between the API call and the map (GitHub Lab).

Impact

This vulnerability could be exploited to achieve Remote Code Execution (RCE) within the Chrome renderer sandbox by simply visiting a malicious website. The CVSS base score for this vulnerability is 6.5 (Medium), with high confidentiality impact but no integrity or availability impact (Ubuntu).

Mitigation and workarounds

The vulnerability was patched in Chrome version 102.0.5005.61. Users and administrators should ensure their Chrome installations are updated to this version or later. The fix was also backported to various Linux distributions including Ubuntu 18.04 LTS where it was fixed in version 103.0.5060.134-0ubuntu0.18.04.1 (Ubuntu).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management