Search for vulnerabilities
Vulnerability details: VCID-wsmm-q15q-aaaq
Vulnerability ID VCID-wsmm-q15q-aaaq
Aliases CVE-2022-2164
Summary Inappropriate implementation in Extensions API in Google Chrome prior to 103.0.5060.53 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted HTML page.
Status Published
Exploitability 0.5
Weighted Severity 5.7
Risk 2.9
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00019 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2022-2164
cvssv3 6.3 https://nvd.nist.gov/vuln/detail/CVE-2022-2164
cvssv3.1 6.3 https://nvd.nist.gov/vuln/detail/CVE-2022-2164
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2022-2164
https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
https://crbug.com/1268445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4917
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7/
https://security.gentoo.org/glsa/202208-25
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
CVE-2022-2164 https://nvd.nist.gov/vuln/detail/CVE-2022-2164
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2022-2164
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2022-2164
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.0285
EPSS Score 0.00019
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.