Impact
Chrome’s Downloads UI displayed an incorrect security prompt when a user visited a specially crafted HTML page, allowing the attacker to spoof the download security dialog. This flaw enables unauthenticated remote users to perform UI spoofing. Based on the description, it is inferred that the vulnerability can be triggered by delivering a malicious HTML page that the user opens in the browser.
Affected Systems
The issue affects Google Chrome for Android and Mac OS versions earlier than 148.0.7778.168. Any system hosting these older Chrome binaries is susceptible until an updated version is installed.
Risk and Exploitability
Chromium rates the severity of this flaw as medium with a CVSS score of 4.2. The EPSS score is reported as less than 1% and the vulnerability is not listed in the CISA KEV catalog. Thus, the likelihood of exploitation is low, but an attacker who successfully lures a user to crafted content could trick the user into accepting malicious files, compromising the integrity of the download process and potentially enabling malware infection.
OpenCVE Enrichment
Debian DSA