Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-57ne-vzp6-b7f4
Vulnerability ID VCID-57ne-vzp6-b7f4
Aliases CVE-2022-0609
GHSA-vv6j-ww6x-54gx
GMS-2022-140
GMS-2022-141
GMS-2022-142
GMS-2022-143
GMS-2022-144
GMS-2022-145
GMS-2022-146
GMS-2022-147
GMS-2022-148
Summary Use after free in Animation. The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. It demands that the victim is doing some kind of user interaction. Technical details are unknown but an exploit is available. There is currently little other public information on the issue other than it has been flagged as `High` severity.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.39522 https://api.first.org/data/v1/epss?cve=CVE-2022-0609
epss 0.39522 https://api.first.org/data/v1/epss?cve=CVE-2022-0609
epss 0.39522 https://api.first.org/data/v1/epss?cve=CVE-2022-0609
epss 0.42955 https://api.first.org/data/v1/epss?cve=CVE-2022-0609
epss 0.42955 https://api.first.org/data/v1/epss?cve=CVE-2022-0609
epss 0.42955 https://api.first.org/data/v1/epss?cve=CVE-2022-0609
epss 0.42955 https://api.first.org/data/v1/epss?cve=CVE-2022-0609
epss 0.42955 https://api.first.org/data/v1/epss?cve=CVE-2022-0609
cvssv3.1 8.8 https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
generic_textual HIGH https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
ssvc Attend https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
cvssv3.1 8.8 https://crbug.com/1296150
generic_textual HIGH https://crbug.com/1296150
ssvc Attend https://crbug.com/1296150
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-vv6j-ww6x-54gx
cvssv3.1 8.8 https://github.com/cefsharp/CefSharp
generic_textual HIGH https://github.com/cefsharp/CefSharp
cvssv3.1 8.8 https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx
cvssv3.1_qr HIGH https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx
generic_textual HIGH https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2022-0609
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2022-0609
Data source KEV
Date added Feb. 15, 2022
Description Google Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Required action Apply updates per vendor instructions.
Due date March 1, 2022
Note
https://nvd.nist.gov/vuln/detail/CVE-2022-0609
Ransomware campaign use Unknown
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:23:25Z/ Found at https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://crbug.com/1296150
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:23:25Z/ Found at https://crbug.com/1296150
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/cefsharp/CefSharp
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-0609
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.9728
EPSS Score 0.39522
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:49:36.154672+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/CefSharp.Wpf/GMS-2022-146.yml 38.0.0