Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-0337

CVE-2022-0337: Google Chrome Information Disclosure Bug

CVE-2022-0337 is an information disclosure flaw in Google Chrome's File System API on Windows that enables attackers to access sensitive data via malicious web pages. This article covers technical details, affected versions, impact assessment, and mitigation strategies.

Published: February 11, 2026

CVE-2022-0337 Overview

CVE-2022-0337 is an inappropriate implementation vulnerability in the File System API in Google Chrome on Windows prior to version 97.0.4692.71. This security flaw allows a remote attacker to obtain potentially sensitive information via a crafted HTML page. The vulnerability specifically affects how Chrome handles file system operations on Windows systems, creating a pathway for information disclosure attacks.

Critical Impact

Remote attackers can extract potentially sensitive information from Windows systems through specially crafted web pages that exploit the File System API implementation flaw.

Affected Products

  • Google Chrome versions prior to 97.0.4692.71 on Windows
  • Microsoft Windows systems running vulnerable Chrome versions
  • Any Windows-based environment using affected Chrome browser versions

Discovery Timeline

  • 2023-01-02 - CVE-2022-0337 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2022-0337

Vulnerability Analysis

This vulnerability stems from an inappropriate implementation in Chrome's File System API when running on Windows operating systems. The File System API provides web applications with the ability to interact with files on the user's local device, but improper implementation can lead to unintended information exposure. In this case, the flaw allows malicious web pages to extract sensitive information that should not be accessible through normal browser operations.

The vulnerability is classified under CWE-668 (Exposure of Resource to Wrong Sphere), indicating that resources are being exposed to actors outside of their intended control sphere. This type of vulnerability can allow attackers to gain access to sensitive data that the browser should protect.

Root Cause

The root cause of CVE-2022-0337 lies in the inappropriate implementation of the File System API within Chrome's Windows-specific code paths. The File System API is designed to provide controlled access to local file systems, but the implementation failed to properly restrict information that could be obtained through crafted requests. This implementation oversight allowed attackers to leverage the API in ways that exposed sensitive information beyond the intended scope of the API's functionality.

Attack Vector

The attack vector for this vulnerability is network-based and requires user interaction. An attacker must convince a victim to visit a maliciously crafted HTML page. Once the victim navigates to the attacker-controlled page, the exploit code can leverage the File System API flaw to extract sensitive information from the victim's Windows system.

The attack requires no special privileges on the target system, making it particularly dangerous as it can be executed against any user with a vulnerable Chrome installation. The crafted HTML page can be delivered through various means including:

  • Phishing emails containing malicious links
  • Compromised legitimate websites
  • Malicious advertisements (malvertising)
  • Social engineering attacks directing users to attacker-controlled domains

Detection Methods for CVE-2022-0337

Indicators of Compromise

  • Unusual File System API calls from browser processes
  • Unexpected network requests to unknown domains following local file system operations
  • Browser attempting to access sensitive file paths without explicit user authorization
  • Anomalous JavaScript execution patterns involving the File System API

Detection Strategies

  • Monitor Chrome browser version across enterprise environments and flag systems running versions prior to 97.0.4692.71
  • Implement web content filtering to detect and block pages with suspicious File System API usage patterns
  • Deploy endpoint detection rules to identify malicious HTML pages exploiting this vulnerability
  • Use browser telemetry to track anomalous File System API interactions

Monitoring Recommendations

  • Enable Chrome's built-in security logging and forward logs to SIEM systems
  • Monitor for unusual file access patterns originating from browser processes
  • Track JavaScript execution logs for suspicious File System API method calls
  • Implement alerting on access attempts to sensitive Windows directories from Chrome processes

How to Mitigate CVE-2022-0337

Immediate Actions Required

  • Update Google Chrome to version 97.0.4692.71 or later immediately
  • Implement enterprise browser policies to enforce automatic Chrome updates
  • Block access to known malicious domains hosting exploit attempts
  • Educate users about the risks of visiting untrusted websites

Patch Information

Google has addressed this vulnerability in Chrome version 97.0.4692.71 released in January 2022. Organizations should ensure all Chrome installations are updated to this version or later. For detailed information about the security update, refer to the Google Chrome Desktop Update announcement. Additional technical details can be found in the Chromium Bug Report #1247389.

Workarounds

  • Disable the File System API in Chrome via enterprise policies if updating is not immediately feasible
  • Implement strict Content Security Policy (CSP) headers on organizational web properties
  • Use network-level filtering to block potentially malicious web content
  • Consider using alternative browsers temporarily until Chrome can be updated
bash
# Configuration example - Chrome enterprise policy to restrict File System API
# Add to Chrome Group Policy or managed preferences
{
  "FileSystemReadAskForUrls": [],
  "FileSystemWriteAskForUrls": [],
  "DefaultFileSystemReadGuardSetting": 2,
  "DefaultFileSystemWriteGuardSetting": 2
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechGoogle Chrome

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability11.73%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-668
  • Vendor Resources
  • Google Chrome Desktop Update

  • Chromium Bug Report #1247389
  • Related CVEs
  • CVE-2026-6364: Google Chrome Skia Info Disclosure Flaw

  • CVE-2026-6313: Google Chrome CORS Information Disclosure

  • CVE-2026-6312: Google Chrome Information Disclosure Flaw

  • CVE-2026-5918: Google Chrome Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English