The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-5472

CVE-2023-5472: Google Chrome Use After Free Vulnerability

CVE-2023-5472 is a use after free flaw in Google Chrome Profiles that enables remote attackers to exploit heap corruption through malicious HTML pages. This article covers technical details, affected versions, and mitigations.

Published: February 4, 2026

CVE-2023-5472 Overview

CVE-2023-5472 is a Use After Free vulnerability in the Profiles component of Google Chrome prior to version 118.0.5993.117. This memory corruption flaw allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. The vulnerability is classified as high severity by the Chromium security team and poses significant risk to users who visit malicious web pages.

Use After Free (UAF) vulnerabilities occur when a program continues to use a pointer after the memory it references has been freed. In the context of browser security, this class of vulnerability is particularly dangerous as it can lead to arbitrary code execution within the browser process, potentially allowing attackers to escape the browser sandbox and compromise the underlying system.

Critical Impact

Remote attackers can potentially achieve arbitrary code execution by exploiting heap corruption through specially crafted HTML pages, compromising user confidentiality, integrity, and system availability.

Affected Products

  • Google Chrome versions prior to 118.0.5993.117
  • Debian Linux 11.0 and 12.0
  • Fedora 38

Discovery Timeline

  • 2023-10-25 - CVE-2023-5472 published to NVD
  • 2025-05-01 - Last updated in NVD database

Technical Details for CVE-2023-5472

Vulnerability Analysis

This Use After Free vulnerability exists within the Profiles component of Google Chrome. The Profiles feature in Chrome manages user-specific data including bookmarks, history, passwords, and settings. When profile-related objects are improperly managed during certain operations, memory that has already been freed may be accessed again, leading to heap corruption.

The vulnerability requires user interaction, specifically navigating to a malicious web page. Once triggered, an attacker can manipulate the freed memory region to achieve heap corruption, which can be leveraged to execute arbitrary code within the context of the Chrome renderer process. Given Chrome's multi-process architecture, successful exploitation could potentially lead to sandbox escape if combined with additional vulnerabilities.

The network-based attack vector with low complexity requirements makes this vulnerability particularly concerning for enterprise environments where users may inadvertently visit compromised websites.

Root Cause

The root cause of CVE-2023-5472 is improper memory management in Chrome's Profiles component (CWE-416: Use After Free). The vulnerability arises when profile-related objects are deallocated but references to these objects remain in use. When the code subsequently attempts to access these dangling pointers, it operates on freed heap memory, creating an exploitable condition.

In browser implementations, UAF vulnerabilities commonly occur during complex state transitions, such as profile switching, tab management, or when JavaScript interacts with browser internals in unexpected ways. The specific trigger involves crafted HTML content that manipulates the timing or sequence of profile object lifecycle operations.

Attack Vector

The attack vector for CVE-2023-5472 is network-based, requiring a victim to visit an attacker-controlled or compromised website hosting a malicious HTML page. The attack proceeds as follows:

  1. The attacker crafts an HTML page designed to trigger specific profile-related operations in Chrome
  2. When a victim navigates to the malicious page, the crafted content manipulates the browser's profile component
  3. The manipulation causes a Use After Free condition, corrupting heap memory
  4. The attacker can leverage this heap corruption to potentially execute arbitrary code

No special privileges are required on the target system, and the attack can be launched remotely against any Chrome user running a vulnerable version. The vulnerability affects the confidentiality, integrity, and availability of the victim's system.

Detection Methods for CVE-2023-5472

Indicators of Compromise

  • Unexpected Chrome crashes or instability, particularly when loading specific web pages
  • Anomalous Chrome renderer process behavior including unexpected memory access patterns
  • Browser process spawning suspicious child processes or making unusual system calls
  • Evidence of heap spray or memory corruption techniques in browser process memory

Detection Strategies

  • Monitor for Chrome crash reports that indicate heap corruption or access violations in the Profiles component
  • Implement network-level monitoring to detect traffic to known malicious domains hosting exploit code
  • Deploy endpoint detection solutions that can identify browser exploitation attempts through behavioral analysis
  • Review browser telemetry data for anomalous profile-related operations or timing patterns

Monitoring Recommendations

  • Enable Chrome's built-in crash reporting to capture exploitation attempts
  • Configure endpoint protection to monitor Chrome process behavior for signs of memory corruption exploitation
  • Implement web filtering to block access to domains known to host browser exploits
  • Maintain centralized logging of browser events across the enterprise for forensic analysis

How to Mitigate CVE-2023-5472

Immediate Actions Required

  • Update Google Chrome to version 118.0.5993.117 or later immediately across all systems
  • Enable automatic updates for Chrome to ensure timely patching of future vulnerabilities
  • For Debian systems, apply patches from Debian Security Advisory DSA-5536
  • For Fedora 38 systems, apply the latest chromium package updates from the Fedora repositories

Patch Information

Google has released Chrome version 118.0.5993.117 which addresses this vulnerability. The patch was announced on October 24, 2023, via the Google Chrome Update Announcement. Additional details about the vulnerability can be found in Chromium Bug Report #1491296.

Linux distribution users should apply vendor-specific patches:

  • Debian: DSA-5536
  • Fedora: Updates available through standard package repositories
  • Gentoo: GLSA 202401-34

Workarounds

  • Restrict browsing to trusted websites until patches can be applied
  • Consider using Chrome's Site Isolation feature to limit the impact of renderer process compromises
  • Deploy browser security policies that restrict execution of JavaScript from untrusted sources
  • Implement network-level filtering to block known malicious domains hosting browser exploits
bash
# Verify Chrome version on Linux
google-chrome --version

# Update Chrome on Debian-based systems
sudo apt update && sudo apt upgrade chromium

# Update Chrome on Fedora
sudo dnf update chromium

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechGoogle Chrome

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability1.12%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-416
  • Technical References
  • Chromium Bug Report #1491296

  • Fedora Package Announcement

  • Fedora Package Update Notice

  • Fedora Security Advisory

  • Gentoo GLSA 202401-34

  • Debian Security Advisory DSA-5536
  • Vendor Resources
  • Google Chrome Update Announcement
  • Related CVEs
  • CVE-2026-5914: Google Chrome CSS Type Confusion Vulnerability

  • CVE-2026-5866: Google Chrome Use After Free Vulnerability

  • CVE-2026-5904: Google Chrome V8 Use-After-Free Flaw

  • CVE-2026-5893: Google Chrome V8 Use-After-Free Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English