PatchSiren cyber security CVE debrief
CVE-2017-5008 Google CVE debrief
CVE-2017-5008 is a Chrome/Blink browser flaw that could let a crafted HTML page trigger attacker-controlled JavaScript during a private script method invocation, enabling universal cross-site scripting (UXSS). The issue was publicly disclosed on 2017-02-17 and was addressed in Chrome updates before 56.0.2924.76 on Linux, Windows, and Mac, and before 56.0.2924.87 on Android.
- Vendor
- Product
- CVE-2017-5008
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
Anyone managing or using Google Chrome on desktop or Android should care, especially security teams responsible for browser patching, endpoint management, and web-facing user populations. Because the flaw involves browser code execution in a UXSS context, organizations that rely on Chrome for access to sensitive web applications should prioritize remediation.
Technical summary
NVD classifies the issue as CWE-79 and assigns CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The published description says Blink in Chrome allowed attacker-controlled JavaScript to run during invocation of a private script method, which could allow arbitrary script or HTML injection via a crafted page. The practical impact is cross-origin script execution in the browser context, which can undermine same-origin protections and expose session- or application-level data.
Defensive priority
Medium. The CVSS score is 6.1, but the browser UXSS impact can be high for organizations that use Chrome as a primary access path to sensitive web applications. Patch priority should be elevated for managed fleets that have not yet moved past the fixed Chrome releases.
Recommended defensive actions
- Update Google Chrome to a version at or above 56.0.2924.76 on Linux, Windows, and Mac, or 56.0.2924.87 on Android.
- Verify managed browser update channels and confirm affected endpoints are no longer on versions at or below 55.0.2883.87, as reflected in the NVD CPE range.
- Apply vendor-provided Linux distribution/browser security updates referenced by the Chrome advisory and downstream errata where applicable.
- Check asset inventories for unmanaged or out-of-support Chrome installations and remove or isolate them until patched.
- Prioritize remediation on systems that access sensitive internal applications, since UXSS can bypass web-origin boundaries and expose confidential data.
Evidence notes
The core behavior and fixed-version information come from the CVE description in the supplied NVD record. The NVD metadata lists CWE-79 and the CVSS 3.0 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, supporting a browser-based, user-interaction-required cross-site scripting/UXSS assessment. Official and vendor references in the corpus include the Chrome stable channel release notice, the Chrome issue tracker entry, and downstream advisories from Red Hat, Debian, and Gentoo, indicating coordinated remediation across vendor ecosystems.
Official resources
Publicly disclosed on 2017-02-17 per the CVE/NVD record. The 2026-05-13 modification date reflects later record maintenance, not the original issue date.