Skip to main content
Need help with a cyber incident now?
Call 24/7: +31 88-2747800

Google LibWebP code execution vulnerability

By 2 October 2023 CERT, SOC, Vulnerability
Google LibWebP code execution vulnerability

This live blog contains information regarding a vulnerability in Google LibWebP. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on October 2, 2023.

Update 2 October 2023

16:30 | On the 25th of September, Google published CVE-2023-5217 describing a vulnerability in LibWebP. Earlier in September Apple and Google respectively published CVE-2023-4863 and CVE-2023-41064 describing the same problem in the library. CVE-2023-5217 is considered a duplicate of CVE-2023-4863 and had a CVSS score assigned of 10, which is considered (too) high. CVE-2023-5217 was rejected as a duplicate on the 27th of September.

LibWebP is a library maintained by Google and is used for image processing. The vulnerability can lead to arbitrary code execution on the system, but the abilities for exploitation and the impact depend on how the library is used by the application.

Exploitation of the vulnerable library has been detected for the implementation in Apple products and the Google Chrome browser. It is advised to create an overview of software using the vulnerable LibWebP library and apply patches when available.

Reason and background of this blog

This blog contains information about vulnerabilities, the possible risk and advice on how to prevent or limit damage. Below are the possible risks, details and background information.

Vulnerability information

On the 25th of September, Google published CVE-2023-5217 describing a vulnerability in LibWebP. Earlier in September Apple and Google respectively published CVE-2023-4863 and CVE-2023-41064 describing the same problem in the library. CVE-2023-5217 is considered a duplicate of CVE-2023-4863 and had a CVSS score assigned of 10, which is considered (too) high. CVE-2023-5217 was rejected as a duplicate on the 27th of September.

LibWebP is a library maintained by Google and is used for image processing. The vulnerability can lead to arbitrary code execution on the system, but the abilities for exploitation and the impact depend on how the library is used by the application.

Exploitation of the vulnerable library has been detected for the implementation in Apple products and the Google Chrome browser. It is advised to create an overview of software using the vulnerable LibWebP library and apply patches when available.

Potential Risk

The vulnerability CVE-2023-5217 has a CVSS score of 10. This vulnerability is considered a duplicate of CVE-2023-4863 and the CVSS score is disputed. The CVSS scale runs from 0 to 10.

A score of 9.8 or higher is rare and implies a high risk of exploitation with high impact. The vulnerabilities registered as CVE-2023-5217, CVE-2023-4863 and CVE-2023-41064 can allow an attacker to execute code on the system running the LibWebP library. The ability and impact of exploitation of the vulnerability depends on how the library is used.

Exploits of CVE-2023-4863 in the Google Chrome browser and CVE-2023-41064 in Apple products have been observed in the wild. Both vendors have released software updates mitigating the vulnerability.

Detail info

Vulnerability CVE-2023-4863 in the Google Chrome browser exists in the following versions:

  • versions prior to 116.0.5845.187 and LibWebP 1.3.2.

The advice is to upgrade to Google Chrome browser version 116.0.5845.187 or later.

Vulnerability CVE-2023-41064 which exists in several Apple products affects the following products and versions:

  • iOS prior to 15.7.9
  • iOS prior to 16.6.1
  • iPadOS prior to 15.7.9
  • iPadOS prior to 16.6.1
  • macOS Big Sur prior to 11.7.10
  • macOS Monterey prior to 12.6.9
  • macOS Ventura prior to 13.5.2

Apple has released software updates; the advice is to upgrade to at least the fixed versions.

For other applications it is advised to create an overview of software using the LibWebP vulnerability and apply patches when available.

If any suspicious or malicious activity is detected in relation to this article, please contact T-CERT. The Tesorion Computer Emergency Response Team offers specialist support 24/7. In emergencies, we immediately conduct an initial assessment by telephone and do all we can to get the situation under control as soon as possible.

Subscribe

Do you want to be informed in time? Sign up for our technical updates

Would you like to receive these critical vulnerabilities by e-mail from now on? Enter your e-mail address below.

Tesorion uses your personal data to send out requested information and possibly for contact by telephone and for marketing and sales purposes. You can change your preferences whenever you want. Read our privacy policy for more information.