Known Exploited Vulnerability
8.8
HIGH
CVE-2023-4863
Google Chromium WebP Heap-Based Buffer Overflow Vu - [Actively Exploited]
Description

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

INFO

Published Date :

Sept. 12, 2023, 3:15 p.m.

Last Modified :

July 31, 2024, 6:19 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

2.8
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Google Chromium WebP contains a heap-based buffer overflow vulnerability that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page. This vulnerability can affect applications that use the WebP Codec.

Required Action :

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Notes :

https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html?m=1

Public PoC/Exploit Available at Github

CVE-2023-4863 has a 34 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2023-4863 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Microsoft edge
2 Microsoft teams
3 Microsoft edge_chromium
4 Microsoft webp_image_extension
1 Mozilla firefox
2 Mozilla firefox_esr
3 Mozilla thunderbird
1 Fedoraproject fedora
1 Debian debian_linux
1 Netapp active_iq_unified_manager
1 Google chrome
1 Electronjs electron
1 Webmproject libwebp
1 Bentley seequent_leapfrog
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-4863.

URL Resource
http://www.openwall.com/lists/oss-security/2023/09/21/4 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/1 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/3 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/4 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/5 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/6 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/7 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/8 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/26/1 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/26/7 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/28/1 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/28/2 Mailing List
http://www.openwall.com/lists/oss-security/2023/09/28/4 Mailing List
https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/ Third Party Advisory
https://blog.isosceles.com/the-webp-0day/ Exploit Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1215231 Issue Tracking Third Party Advisory
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html Release Notes Vendor Advisory
https://crbug.com/1479274 Issue Tracking Permissions Required Vendor Advisory
https://en.bandisoft.com/honeyview/history/ Release Notes Third Party Advisory
https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a Patch
https://github.com/webmproject/libwebp/releases/tag/v1.3.2 Release Notes
https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/[email protected]/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/ Mailing List Release Notes
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863 Patch Vendor Advisory
https://news.ycombinator.com/item?id=37478403 Exploit Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2023-4863 Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/202309-05 Third Party Advisory
https://security.gentoo.org/glsa/202401-10 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230929-0011/ Third Party Advisory
https://sethmlarson.dev/security-developer-in-residence-weekly-report-16 Exploit
https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ Exploit Third Party Advisory
https://www.bentley.com/advisories/be-2023-0001/ Third Party Advisory
https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5496 Third Party Advisory
https://www.debian.org/security/2023/dsa-5497 Third Party Advisory
https://www.debian.org/security/2023/dsa-5498 Third Party Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Config files for my GitHub profile.

config github-config

Updated: 3 weeks, 3 days ago
0 stars 0 fork 0 watcher
Born at : Oct. 30, 2024, 1:38 a.m. This repo has been linked 3 different CVEs too.

None

Updated: 4 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : July 10, 2024, 3:11 a.m. This repo has been linked 1 different CVEs too.

Latest CVEs with their Proof of Concept exploits.

Python

Updated: 2 months, 2 weeks ago
5 stars 1 fork 1 watcher
Born at : May 24, 2024, 11:02 a.m. This repo has been linked 78 different CVEs too.

Exploit for CVE-2023-42860

exploit macos apple fda root sip tcc

Shell C

Updated: 5 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : April 9, 2024, 2:53 p.m. This repo has been linked 2 different CVEs too.

C implementation of libwebp 0-click vulnerability

Updated: 9 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 7, 2024, 6:58 a.m. This repo has been linked 1 different CVEs too.

Triggering the famous libweb 0day vuln with libfuzzer

C++

Updated: 9 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 4, 2024, 1:33 a.m. This repo has been linked 1 different CVEs too.

Triggering the famous libweb 0day vuln with libfuzzer

C++

Updated: 9 months, 2 weeks ago
1 stars 1 fork 1 watcher
Born at : Feb. 3, 2024, 12:27 p.m. This repo has been linked 1 different CVEs too.

Config files for my GitHub profile.

config github-config

Updated: 4 months ago
2 stars 0 fork 0 watcher
Born at : Dec. 21, 2023, 6:53 p.m. This repo has been linked 20 different CVEs too.

This tool calculates tricky canonical huffman histogram for CVE-2023-4863.

CMake C

Updated: 10 months, 3 weeks ago
26 stars 2 fork 2 watcher
Born at : Dec. 19, 2023, 1:32 a.m. This repo has been linked 2 different CVEs too.

None

Dockerfile C Shell HTML JavaScript

Updated: 2 months, 3 weeks ago
44 stars 5 fork 5 watcher
Born at : Dec. 18, 2023, 11:12 p.m. This repo has been linked 1 different CVEs too.

A PowerShell module for querying the National Vulnerability Database

PowerShell

Updated: 2 months, 2 weeks ago
13 stars 0 fork 0 watcher
Born at : Dec. 8, 2023, 12:07 a.m. This repo has been linked 1 different CVEs too.

None

Makefile CMake Python Shell M4 C Go C++ HTML

Updated: 5 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Nov. 11, 2023, 6:51 a.m. This repo has been linked 1 different CVEs too.

None

Python HTML JavaScript C

Updated: 2 months, 3 weeks ago
102 stars 14 fork 14 watcher
Born at : Nov. 2, 2023, 12:56 p.m. This repo has been linked 3 different CVEs too.

A tool for finding vulnerable libwebp(CVE-2023-4863)

Shell

Updated: 9 months ago
21 stars 12 fork 12 watcher
Born at : Oct. 5, 2023, 3:28 a.m. This repo has been linked 1 different CVEs too.

Find Electron Apps Vulnerable to CVE-2023-4863 / CVE-2023-5129

PowerShell

Updated: 9 months ago
5 stars 0 fork 0 watcher
Born at : Sept. 30, 2023, 2:47 a.m. This repo has been linked 2 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-4863 vulnerability anywhere in the article.

  • security.nl
Apple vindt kritiek Chrome-lek dat remote code execution mogelijk maakt

Apple heeft een kritieke kwetsbaarheid in Google Chrome gevonden waardoor een aanvaller willekeurige code op systemen kan uitvoeren en die in het ergste geval kan overnemen. Een gebruiker hoeft hiervo ... Read more

Published Date: Oct 30, 2024 (3 weeks, 3 days ago)
  • Cybersecurity News
CVE-2024-30051: Windows Elevation of Privilege Flaw Exploited by QakBot Malware, PoC Published

Security researchers published the technical details and a proof-of-concept exploit (PoC) code for a zero-day vulnerability in Windows, tracked as CVE-2024-30051, which could allow attackers to escala ... Read more

Published Date: Sep 10, 2024 (2 months, 1 week ago)
  • huntress.com
Critical Vulnerability: WebP Heap Buffer Overflow (CVE-2023-4863) | Huntress

The Huntress team is currently investigating CVE-2023-4863, a heap buffer overflow in the WebP image encoding/decoding (codec) library (libwebp). Threat actors are exploiting this critical vulnerabili ... Read more

Published Date: Jul 08, 2024 (4 months, 2 weeks ago)

The following table lists the changes that have been made to the CVE-2023-4863 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Reanalysis by [email protected]

    Jul. 31, 2024

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:* versions up to (excluding) 117.0.2045.31 OR *cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:* versions up to (excluding) 117.0.2045.31 *cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:* versions up to (excluding) 117.0.5938.62 *cpe:2.3:a:microsoft:teams:1.6.00.26463:*:*:*:*:macos:*:* *cpe:2.3:a:microsoft:teams:1.6.00.26474:*:*:*:*:desktop:*:* *cpe:2.3:a:microsoft:webp_image_extension:1.0.62681.0:*:*:*:*:*:*:*
  • Modified Analysis by [email protected]

    Jun. 27, 2024

    Action Type Old Value New Value
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/21/4 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/21/4 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/22/1 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/22/1 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/22/3 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/22/3 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/22/4 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/22/4 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/22/5 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/22/5 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/22/6 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/22/6 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/22/7 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/22/7 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/22/8 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/22/8 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/26/1 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/26/1 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/26/7 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/26/7 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/28/1 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/28/1 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/28/2 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/28/2 Mailing List
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/09/28/4 No Types Assigned http://www.openwall.com/lists/oss-security/2023/09/28/4 Mailing List
    Changed Reference Type https://blog.isosceles.com/the-webp-0day/ No Types Assigned https://blog.isosceles.com/the-webp-0day/ Exploit, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/ Mailing List, Release Notes
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/ Mailing List, Release Notes
    Changed Reference Type https://security.gentoo.org/glsa/202401-10 No Types Assigned https://security.gentoo.org/glsa/202401-10 Third Party Advisory
    Changed Reference Type https://security.netapp.com/advisory/ntap-20230929-0011/ No Types Assigned https://security.netapp.com/advisory/ntap-20230929-0011/ Third Party Advisory
    Changed Reference Type https://sethmlarson.dev/security-developer-in-residence-weekly-report-16 No Types Assigned https://sethmlarson.dev/security-developer-in-residence-weekly-report-16 Exploit
    Changed Reference Type https://www.bentley.com/advisories/be-2023-0001/ No Types Assigned https://www.bentley.com/advisories/be-2023-0001/ Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
    Added CPE Configuration OR *cpe:2.3:a:bentley:seequent_leapfrog:*:*:*:*:*:*:*:* versions up to (excluding) 2023.2
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Jan. 07, 2024

    Action Type Old Value New Value
    Added Reference Chrome https://security.gentoo.org/glsa/202401-10 [No types assigned]
  • CVE Modified by [email protected]

    Oct. 28, 2023

    Action Type Old Value New Value
    Added Reference https://www.bentley.com/advisories/be-2023-0001/ [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 27, 2023

    Action Type Old Value New Value
    Added Reference https://sethmlarson.dev/security-developer-in-residence-weekly-report-16 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 02, 2023

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/ [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 29, 2023

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20230929-0011/ [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 28, 2023

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/28/4 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 28, 2023

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/28/2 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 28, 2023

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/28/1 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 27, 2023

    Action Type Old Value New Value
    Changed Description Heap buffer overflow in WebP in Google Chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical) Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/26/7 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 27, 2023

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/26/1 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 22, 2023

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/22/7 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/22/8 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/22/6 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 22, 2023

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/22/3 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/22/4 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/22/5 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 22, 2023

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/22/1 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 22, 2023

    Action Type Old Value New Value
    Added Reference https://blog.isosceles.com/the-webp-0day/ [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 22, 2023

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2023/09/21/4 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 21, 2023

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/ [No Types Assigned]
  • Reanalysis by [email protected]

    Sep. 19, 2023

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:* versions up to (excluding) 1.3.2
  • Initial Analysis by [email protected]

    Sep. 18, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
    Changed Reference Type https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/ No Types Assigned https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/ Third Party Advisory
    Changed Reference Type https://bugzilla.suse.com/show_bug.cgi?id=1215231 No Types Assigned https://bugzilla.suse.com/show_bug.cgi?id=1215231 Issue Tracking, Third Party Advisory
    Changed Reference Type https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html No Types Assigned https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html Release Notes, Vendor Advisory
    Changed Reference Type https://crbug.com/1479274 No Types Assigned https://crbug.com/1479274 Issue Tracking, Permissions Required, Vendor Advisory
    Changed Reference Type https://en.bandisoft.com/honeyview/history/ No Types Assigned https://en.bandisoft.com/honeyview/history/ Release Notes, Third Party Advisory
    Changed Reference Type https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a No Types Assigned https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a Patch
    Changed Reference Type https://github.com/webmproject/libwebp/releases/tag/v1.3.2 No Types Assigned https://github.com/webmproject/libwebp/releases/tag/v1.3.2 Release Notes
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html No Types Assigned https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html No Types Assigned https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html No Types Assigned https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/ Mailing List, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/ Mailing List, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/ Mailing List, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/ Mailing List, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/ Mailing List, Third Party Advisory
    Changed Reference Type https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863 No Types Assigned https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863 Patch, Vendor Advisory
    Changed Reference Type https://news.ycombinator.com/item?id=37478403 No Types Assigned https://news.ycombinator.com/item?id=37478403 Exploit, Third Party Advisory
    Changed Reference Type https://security.gentoo.org/glsa/202309-05 No Types Assigned https://security.gentoo.org/glsa/202309-05 Third Party Advisory
    Changed Reference Type https://security-tracker.debian.org/tracker/CVE-2023-4863 No Types Assigned https://security-tracker.debian.org/tracker/CVE-2023-4863 Issue Tracking, Third Party Advisory
    Changed Reference Type https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ No Types Assigned https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ Exploit, Third Party Advisory
    Changed Reference Type https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/ No Types Assigned https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/ Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2023/dsa-5496 No Types Assigned https://www.debian.org/security/2023/dsa-5496 Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2023/dsa-5497 No Types Assigned https://www.debian.org/security/2023/dsa-5497 Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2023/dsa-5498 No Types Assigned https://www.debian.org/security/2023/dsa-5498 Third Party Advisory
    Changed Reference Type https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ No Types Assigned https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ Third Party Advisory
    Added CWE NIST CWE-787
    Added CPE Configuration OR *cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* versions up to (excluding) 116.0.5845.187
    Added CPE Configuration OR *cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* *cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* *cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* versions up to (excluding) 117.0.1 *cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* versions up to (excluding) 102.15.1 *cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* versions from (including) 115.0 up to (excluding) 115.2.1 *cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* versions up to (excluding) 102.15.1 *cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* versions from (including) 115.0 up to (excluding) 115.2.2
    Added CPE Configuration OR *cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:* versions up to (excluding) 117.0.2045.31
  • CVE Modified by [email protected]

    Sep. 18, 2023

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 18, 2023

    Action Type Old Value New Value
    Added Reference https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/ [No Types Assigned]
    Added Reference https://github.com/webmproject/libwebp/releases/tag/v1.3.2 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 18, 2023

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/ [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 17, 2023

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 17, 2023

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2023/dsa-5498 [No Types Assigned]
    Added Reference https://security.gentoo.org/glsa/202309-05 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 17, 2023

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/ [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 16, 2023

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 16, 2023

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/ [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 15, 2023

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/ [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 15, 2023

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/ [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 14, 2023

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2023/dsa-5496 [No Types Assigned]
    Added Reference https://www.debian.org/security/2023/dsa-5497 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 13, 2023

    Action Type Old Value New Value
    Added Reference https://bugzilla.suse.com/show_bug.cgi?id=1215231 [No Types Assigned]
    Added Reference https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ [No Types Assigned]
    Added Reference https://security-tracker.debian.org/tracker/CVE-2023-4863 [No Types Assigned]
    Added Reference https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ [No Types Assigned]
    Added Reference https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a [No Types Assigned]
    Added Reference https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/ [No Types Assigned]
    Added Reference https://en.bandisoft.com/honeyview/history/ [No Types Assigned]
    Added Reference https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863 [No Types Assigned]
    Added Reference https://news.ycombinator.com/item?id=37478403 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-4863 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-4863 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

44.32 }} -4.91%

score

0.97496

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability