First published: Sun Mar 06 2022(Updated: )
Insufficient validation of untrusted input in VPN in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a local attacker to bypass managed device restrictions via physical access to the device. (Chromium security severity: Medium)
Credit: chrome-cve-admin@google.com Andr.Ess
Affected Software | Affected Version | How to fix |
---|---|---|
debian/chromium | <=90.0.4430.212-1~deb10u1 | 116.0.5845.180-1~deb11u1 120.0.6099.109-1~deb11u1 119.0.6045.199-1~deb12u1 120.0.6099.109-1~deb12u1 120.0.6099.109-1 |
Google Chrome (Trace Event) | <106.0.5249.61 | 106.0.5249.61 |
Google Chrome (Trace Event) | <106.0.5249.62 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2022-3312 is classified as Medium.
To fix CVE-2022-3312, update Google Chrome or Chromium to version 106.0.5249.61 or higher.
CVE-2022-3312 affects Google Chrome on ChromeOS prior to version 106.0.5249.62 and certain versions of the Chromium package.
CVE-2022-3312 is a vulnerability due to insufficient validation of untrusted input in VPN functionality.
Yes, a local attacker with physical access can exploit CVE-2022-3312 to bypass managed device restrictions.