Patching Type Confusion Vulnerability in Google Chrome (CVE-2022-3723 - Zero-Day)

Modified on Mon, 29 Sep at 9:08 AM

Product Version: 6.5.0.0


Overview

Google has addressed a high-severity Type Confusion Zero-Day vulnerability in the Chrome browser for Windows, Linux, and Mac. Identified as CVE-2022-3723, this was the seventh Zero-Day vulnerability patched by Google in 2022. Exploiting this flaw in the V8 engine could allow attackers to execute arbitrary code or perform denial-of-service (DoS) attacks.


CVE Assigned

  • CVE-2022-3723

Affected Software

  • Google Chrome versions before 107.0.5304.87 for Mac and Linux
  • Google Chrome versions before 107.0.5304.87/.88 for Windows

Solution

To address this vulnerability, Google has released security patches. Organizations can quickly detect and remediate this vulnerability using the Saner CVEM platform by following the steps below.

Saner CVEM: Vulnerability Detection and Patching of Google Chrome

  1. Login to the Saner CVEM platform.
  2. Switch to the account/site-specific view and navigate to VM Tool.
  3. If your Google Chrome installation is vulnerable, Saner CVEM will list CVE-2022-3723 under Top Vulnerabilities or Recently Discovered Vulnerabilities.
  4. Search for the vulnerability in the VM Tool. If affected, proceed to patch through:
    • PM → Missing Patches
  5. In the Asset Source section, select the required Groups/Devices and click Apply.
  6. From the Asset section, select the Google Chrome product.
  7. Click Apply Selected Patches (top-right corner).
    • Provide a Task Name and choose a Remediation Schedule.
    • Confirm by clicking Apply Selected Patches.
  8. A remediation job will be created, which upgrades Google Chrome and resolves the vulnerability.
  9. Once remediation is complete, the Saner agent will automatically rescan the system and upload the updated status to Saner CVEM.

Conclusion

By using Saner CVEM, organizations can efficiently detect and remediate high-severity vulnerabilities such as CVE-2022-3723 in Google Chrome. Applying the vendor’s patch through Saner CVEM ensures systems are updated promptly, reducing exposure to exploitation and enhancing overall security posture.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article