
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Out of bounds read vulnerability (CVE-2023-3497) was discovered in Google Security Processor firmware (Titan C firmware) in Google Chrome on Chrome OS versions prior to 114.0.5735.90. The vulnerability was found internally by Google and was disclosed in July 2023 (Chrome Releases).
The vulnerability is classified as an Out-of-bounds Read (CWE-125) with a CVSS v3.1 base score of 4.6 (Medium). The attack vector requires physical access to the device (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), with no impact on confidentiality (C:N) or integrity (I:N), but high impact on availability (A:H) (NVD).
When exploited, this vulnerability allows a local attacker with physical access to the device to perform a denial of service attack. The severity is rated as Medium according to Chromium's security assessment (Chrome Releases).
The vulnerability has been patched in Chrome OS version 114.0.5735.90. Users are advised to update their Chrome OS to this version or later to mitigate the vulnerability (Chrome Releases).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”