Product version:6.5.0.0
Overview
Google has patched a zero-day vulnerability in Google Chrome, tracked as CVE-2022-4262.
The issue is a high-severity type confusion weakness in the Chrome V8 JavaScript engine, reported by Clément Lecigne of Google's Threat Analysis Group.
The vulnerability has been exploited in the wild since early 2022.
Successful exploitation can:
Cause browser crashes by reading or writing memory out of bounds.
Allow arbitrary code execution, enabling attackers to run malicious code on the victim’s system.
This makes CVE-2022-4262 a critical security risk, requiring urgent patching.
CVE Assigned
CVE-2022-4262
Affected Software
Google Chrome versions before 108.0.5359.94 on:
Windows
Linux
macOS
Solution
Google has released security patches to fix this issue. We strongly recommend updating Chrome to version 108.0.5359.94 or later immediately.
Vulnerability Detection and Patching with Saner CVEM
Follow these steps to detect and remediate this vulnerability using Saner CVEM:
Login to the Saner CVEM platform.
Switch to the Account/Site-specific view and go to the VM tool.
If your Chrome installation is vulnerable, Saner CVEM will list CVE-2022-4262 under Top Vulnerabilities or Recently Discovered Vulnerabilities.
Search for CVE-2022-4262 in the VM tool.
If affected, apply the patch through:
PM → Missing Patches
Select the relevant Groups/Devices in the Asset Source section and click Apply.
In the Asset section, choose the Google Chrome product.
Click Apply Selected Patches (top-right corner).
This will prompt a Create Patching Task window.
Enter the Task Name and set the Remediation Schedule as per your preference.
Confirm by clicking Apply Selected Patches.
A Remediation Job will be created, upgrading Chrome to a safe version and fixing the vulnerability.
After remediation, the Saner agent automatically scans again and uploads the updated results to Saner CVEM.
Conclusion
CVE-2022-4262 is an actively exploited zero-day vulnerability in Google Chrome.
To ensure protection:
Update Chrome immediately to the patched version.
Use Saner CVEM for continuous vulnerability detection, patch deployment, and compliance tracking.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article