Attacker Value
High
(1 user assessed)
Exploitability
Moderate
(1 user assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
5

CVE-2022-2294

Disclosure Date: July 28, 2022
Exploited in the Wild
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
Initial Access
Techniques
Validation
Validated

Description

Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Add Assessment

CVSS V3 Severity and Metrics
Base Score:
8.8 High
Impact Score:
5.9
Exploitability Score:
2.8
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • apple,
  • fedoraproject,
  • google,
  • webkitgtk,
  • webrtc project,
  • wpewebkit

Products

  • chrome,
  • extra packages for enterprise linux 8.0,
  • fedora 35,
  • fedora 36,
  • ipados,
  • iphone os,
  • mac os x,
  • mac os x 10.15.7,
  • macos,
  • tvos,
  • watchos,
  • webkitgtk,
  • webrtc -,
  • wpe webkit
Technical Analysis

This site uses cookies for anonymized analytics. For more information or to change your cookie settings, view our Cookie Policy.