CVE-2023-4762

Vulnerability updated 4 months ago (2024-05-04T17:17:43.650Z)
Download STIX
Preview STIX
CVE-2023-4762 is a software vulnerability, specifically a remote code execution flaw in the Chrome web browser. This vulnerability was identified by researchers from Google's Threat Analysis Group (TAG) in September 2023, around the same time Apple disclosed its own zero-day bugs. The vulnerability was found to be exploited as part of an exploit chain developed by a commercial software company named Intellexa. Intellexa was discovered to have been using this exploit chain, which included the Chrome zero-day CVE-2023-4762, to install a spying tool called Predator on Android devices. The delivery of Predator was achieved through two methods: the AitM injection and via one-time links sent directly to the target device. These activities were detected and reported by Google TAG, pointing out the abuse of the Chrome zero-day vulnerability. The exploitation of CVE-2023-4762 by Intellexa was not isolated to general Android devices but was specifically noted in Egypt. Google TAG identified Intellexa as a surveillance vendor, abusing the Chrome zero-day vulnerability to drop the Predator spying tool on targeted Android devices within the region. This revelation underscores the potential severity and global security implications of such software vulnerabilities.
Description last updated: 2024-05-04T17:16:19.631Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Exploit
Chrome
Android
Google
Chromium
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
PredatorUnspecified
2
Predator is a malicious software (malware) that has recently re-emerged as a significant threat to cyber security. It infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge, and can steal personal information, disrupt operations, or even hold data h
Source Document References
Information about the CVE-2023-4762 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CISA
7 months ago
CISA Adds One Known Exploited Vulnerability to Catalog | CISA
DARKReading
8 months ago
Days After Google, Apple Reveals Exploited Zero-Day in Browser Engine
CERT-EU
8 months ago
Google fixes first actively exploited Chrome zero-day of 2024
CERT-EU
8 months ago
Alert: New Chrome Zero-Day Vulnerability Being Exploited
CERT-EU
9 months ago
Google fixes 8th Chrome zero-day exploited in attacks this year
Securityaffairs
9 months ago
Google addressed a new actively exploited Chrome zero-day
Securelist
10 months ago
PC malware statistics, Q3 2023
CERT-EU
a year ago
Recently patched Apple, Chrome zero-days exploited in spyware attacks
CERT-EU
a year ago
Tripwire Patch Priority Index for September 2023
CERT-EU
a year ago
Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain
DARKReading
a year ago
Chrome Flags Third Zero-Day This Month That's Tied to Spying Exploits
CERT-EU
a year ago
Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor
CERT-EU
a year ago
More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator
CERT-EU
a year ago
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware
CERT-EU
a year ago
Predator Spyware Delivered to iOS, Android Devices via Zero-Days, MitM Attacks
CERT-EU
a year ago
Predator exploit patched in iPhones, iPads
CERT-EU
a year ago
New Apple Zero-Days Exploited to Deliver Predator Spyware
CERT-EU
a year ago
Konkurent Pegasusa w akcji. Wykryto właśnie ataki z wykorzystaniem SMSów. W użyciu podatności 0day na iPhone / Androida. Predator.
CERT-EU
a year ago
2024 Election Shocker!: Government-Backed Hackers Hijacked Mobile Networks to Plant Predator Spyware on Politician's iPhone | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
a year ago
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware