CVE-2018-6127

9.6 CRITICAL

📋 TL;DR

This vulnerability allows a remote attacker who has already compromised Chrome's renderer process to escape the browser sandbox and execute arbitrary code on the host system. It affects Google Chrome versions prior to 67.0.3396.62. Users who visit malicious websites with vulnerable Chrome versions are at risk.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 67.0.3396.62
Operating Systems: Windows, Linux, macOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Requires renderer process compromise first.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise - attacker gains full control of the host operating system after escaping the sandbox.

🟠

Likely Case

Attacker who has already compromised the renderer process (via another vulnerability) escalates to full system access.

🟢

If Mitigated

Sandbox remains intact, limiting attacker to browser context only.

🌐 Internet-Facing: HIGH - Exploitable via visiting malicious websites.
🏢 Internal Only: MEDIUM - Requires user interaction with malicious content.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires chaining with another vulnerability to first compromise renderer process. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 67.0.3396.62 and later

Vendor Advisory: https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html

Restart Required: Yes

Instructions:

1. Open Chrome menu > Help > About Google Chrome. 2. Chrome will automatically check for and install updates. 3. Click 'Relaunch' when prompted to restart Chrome.

🔧 Temporary Workarounds

Disable IndexedDB

all

Disable IndexedDB API which may reduce attack surface but will break many web applications.

chrome://flags/#enable-indexed-db
Set to 'Disabled'

🧯 If You Can't Patch

  • Use alternative browser that is not vulnerable
  • Implement strict web filtering to block malicious sites

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in menu > Help > About Google Chrome

Check Version:

google-chrome --version (Linux) or check About page

Verify Fix Applied:

Verify Chrome version is 67.0.3396.62 or higher

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports
  • Unusual process creation from Chrome

Network Indicators:

  • Connections to known malicious domains

SIEM Query:

process_name="chrome.exe" AND (parent_process!="explorer.exe" OR command_line CONTAINS "--type=renderer")

🔗 References

📤 Share & Export