
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-5853 is a security vulnerability identified in Google Chrome versions prior to 119.0.6045.105. The vulnerability involves incorrect security UI implementation in the Downloads feature that allows a remote attacker to obfuscate security UI through a crafted HTML page. This issue was discovered by Hafiizh and reported on June 22, 2023, with Google assigning it a Medium severity rating (Chrome Release).
The vulnerability is classified as an Origin Validation Error (CWE-346) with a CVSS v3.1 base score of 4.3 (Medium). The attack vector is network-based (AV:N), requires low attack complexity (AC:L), needs no privileges (PR:N), requires user interaction (UI:R), has unchanged scope (S:U), with no impact on confidentiality (C:N), low impact on integrity (I:L), and no impact on availability (A:N) (NVD).
The vulnerability allows remote attackers to potentially manipulate the security user interface in Chrome's Downloads feature through specially crafted HTML pages. This could lead to users being misled about the security status or nature of downloads (Chrome Release).
The vulnerability has been patched in Google Chrome version 119.0.6045.105. Users and administrators are advised to update to this version or later. The fix has been incorporated into various distributions including Debian 11 (Bullseye) and 12 (Bookworm), Fedora 37, 38, and 39 (Debian Advisory, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."