Note: This is a July 2022 security alert preserved for reference. Ensure your environment is running a current Chrome version. DOYB clients had automated update schedules in place that handled this within hours of the patch release.
What Is CVE-2022-2294?
CVE-2022-2294 is a heap buffer overflow vulnerability in Chrome's WebRTC (Web Real-Time Communication) component. It was the fourth zero-day vulnerability patched by Google in Chrome during 2022 — a frequency that reflects both the complexity of modern browsers and the commercial value attackers place on browser exploits.
The vulnerability affected all Chrome versions below 103.0.5060.134 on Windows, Mac, and Linux. Exploitation required no complex interaction — visiting a malicious web page was sufficient to trigger the vulnerability on an unpatched system. Google confirmed at the time of disclosure that an exploit existed in the wild.
Why Zero-Day Vulnerabilities Require Immediate Action
Not all vulnerabilities are equal. For most security patches, a standard maintenance window — applying updates weekly or bi-weekly during off-hours — is an acceptable operational posture. The vulnerability is known, no exploit is publicly circulating, and the exposure window is bounded.
Zero-day vulnerabilities change this calculation. By definition, a zero-day is a vulnerability for which an exploit existed before — or was developed simultaneously with — the vendor's patch. When Google discloses a zero-day, attackers are already using it. Every hour between disclosure and patching is an hour of active exposure in a threat environment where the attack technique is known and operational.
Organizations that treat zero-days with the same cadence as routine patches are operating on a response timeline that doesn't match the threat timeline. The patch exists — the only question is whether it gets applied before an attacker uses the exploit against a device in the environment.
How to Verify Your Chrome Version
For any devices that were not covered by automated patch management at the time of this alert, manual verification follows these steps:
- Open Google Chrome on the device in question.
- Click the three-dot menu (⋮) in the upper-right corner of the browser window.
- Select Help, then About Google Chrome.
- Chrome checks for available updates automatically — allow the check to complete.
- Verify the version reads 103.0.5060.134 or higher.
- If an update is applied, relaunch Chrome when prompted to complete installation.
Patch Management Is the Underlying Issue
Manual verification of browser versions is not a sustainable security posture for any organization running more than a handful of devices. The underlying question this vulnerability surfaces is not "did we patch Chrome?" but "do we have a patch management system that would have handled this automatically, within hours of release, without requiring anyone to check manually?"
DOYB's managed clients run automated patch management that monitors for and applies updates on a continuous cycle — checking every 2–4 hours. When this zero-day was patched, managed clients were covered without any manual intervention from IT staff or business leadership. The process handled it the same way it handles every other patch: automatically, within the defined response window, with documentation.
DOYB's managed clients had automated patch schedules that applied this update within hours of release — without a manual intervention from anyone in the organization.
What Your Organization Should Review After Any Zero-Day Alert
A zero-day disclosure is a useful forcing function for evaluating broader patch posture. When an alert like this surfaces, the questions worth answering are:
- What is the current patch management policy and cadence? Is it documented?
- Can the organization produce a current browser version inventory across all endpoints?
- How frequently does vulnerability scanning run, and what does it cover?
- Is MDR (Managed Detection and Response) alerting in place for exploit activity?
If any of these questions produce uncertainty, that uncertainty represents documented exposure — not theoretical risk. The Ascend Cyber Assessment evaluates patch posture, endpoint coverage, and vulnerability management as part of a structured review of the organization's security control environment.