Impact
The vulnerability arises from insufficient data validation in InterestGroups handling code within Google Chrome. An attacker who has already compromised the renderer process can craft a malicious HTML page to exploit this flaw, potentially bypassing the browser’s sandbox protections. This leads to privilege escalation, allowing the attacker to execute code with elevated privileges and compromise the integrity of the host system.
Affected Systems
Affected Chrome installations are not explicitly enumerated in the CVE data. The description mentions "prior to 148.0.7778.96" but does not provide a definitive fix or affected version list. Administrators must consult Google’s Chrome release notes and security advisories to determine which installs remain vulnerable.
Risk and Exploitability
The vulnerability carries a high severity rating, reflected by a CVSS score of 8.3. No EPSS score is available, and the issue is not listed in CISA’s KEV catalog, suggesting no known active exploitation. Leveraging the flaw requires renderer compromise, typically achieved through malicious web content. The sandbox escape directly threatens system integrity, so the risk remains elevated until a vendor patch is applied.
OpenCVE Enrichment
Debian DSA