⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2021-11-17. Required action: Apply updates per vendor instructions..

CVE-2021-38003Improper Handling of Exceptional Conditions in Google Chrome

Severity
8.8HIGHNVD
EPSS
68.3%
top 1.39%
CISA KEV
KEV
Added 2021-11-03
Due 2021-11-17
Exploit
Exploited in wild
Active exploitation observed
Timeline
KEV addedNov 3
KEV dueNov 17
PublishedNov 23
Latest updateDec 3
CISA Required Action: Apply updates per vendor instructions.

Description

Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5google/chromeunspecified95.0.4638.69
NVDgoogle/chrome< 95.0.4638.69
debiandebian/chromium< chromium 97.0.4692.71-0.1 (bookworm)
Debianchromium/chromium< 97.0.4692.71-0.1~deb11u1+3

Also affects: Debian Linux 10.0, 11.0, Fedora 34

🔴Vulnerability Details

5
Project0
The More You Know, The More You Know You Don’t Know - Project Zero2022-04-01
GHSA
GHSA-4xx3-xg55-3wr5: Inappropriate implementation in V8 in Google Chrome prior to 952021-11-24
OSV
CVE-2021-38003: Inappropriate implementation in V8 in Google Chrome prior to 952021-11-23
VulnCheck
Google Chromium V8 Memory Corruption Vulnerability2021
Project0
Project Zero RCA: CVE-2022-1364: Inconsistent Object Materialization in V8

📋Vendor Advisories

3
CISA
Google Chromium V8 Memory Corruption Vulnerability2021-11-03
Microsoft
Chromium: CVE-2021-38003 Inappropriate implementation in V82021-10-12
Debian
CVE-2021-38003: chromium - Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowe...2021

🕵️Threat Intelligence

7
Mandiant
Intellexa’s Prolific Zero-Day Exploits Continue2025-12-03
Mandiant
Sanctioned but Still Spying: Intellexa’s Prolific Zero-Day Exploits Continue2025-12-03
Talos
Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware2023-05-25
Talos
Mercenary mayhem: A technical analysis of Intellexa&#x27;s PREDATOR spyware2023-05-25
Qualys
Managing CISA Known Exploited Vulnerabilities with Qualys VMDR | Qualys2022-02-23