
Cloud Vulnerability DB
A community-led vulnerabilities database
Insufficient policy enforcement in ADB in Google Chrome on ChromeOS prior to version 114.0.5735.90 allowed a local attacker to bypass device policy restrictions via physical access to the device. This vulnerability was assigned CVE-2023-3742 and was rated as High severity by Chromium security team (NVD, CVE).
The vulnerability exists in the Android Debug Bridge (ADB) component of Google Chrome on ChromeOS. It has been assigned a CVSS v3.1 base score of 6.8 (Medium) with the vector string CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The scoring indicates that physical access is required (AV:P), the complexity is low (AC:L), no privileges are required (PR:N), and no user interaction is needed (UI:N). The scope is unchanged (S:U), with high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) (NVD).
When exploited, this vulnerability allows an attacker with physical access to the device to bypass ChromeOS device policy restrictions. This could potentially compromise the security controls put in place by device administrators (NVD).
The vulnerability has been patched in Google Chrome on ChromeOS version 114.0.5735.90. Users and administrators should ensure their systems are updated to this version or later to mitigate the risk (CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."