CVE-2020-15980
📋 TL;DR
This vulnerability allows a local attacker on Android devices to bypass Chrome's navigation restrictions using specially crafted Intents. It affects Google Chrome on Android versions prior to 86.0.4240.75. The attacker must have local access to the device to exploit this vulnerability.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Backports Sle by Opensuse
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
An attacker with physical access could bypass Chrome's security restrictions to navigate to malicious websites or perform unauthorized actions within the browser context.
Likely Case
Malicious apps on the same device could exploit this to redirect Chrome to phishing sites or bypass content restrictions.
If Mitigated
With proper app isolation and Chrome updates, the risk is minimal as the attacker requires local access and the vulnerability is patched.
🎯 Exploit Status
Exploitation requires crafting specific Intents and local access to the Android device.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 86.0.4240.75 and later
Vendor Advisory: https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Google Play Store 2. Search for Chrome 3. Update to version 86.0.4240.75 or later 4. Restart Chrome
🔧 Temporary Workarounds
Disable Chrome Intents
androidRestrict Chrome's ability to handle external intents through Android settings
Navigate to Android Settings > Apps > Chrome > Open by default > Clear defaults
🧯 If You Can't Patch
- Restrict physical access to Android devices
- Implement mobile device management (MDM) to control app installations
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in Settings > About Chrome. If version is below 86.0.4240.75, device is vulnerable.
Check Version:
chrome://version/ in Chrome browser
Verify Fix Applied:
Confirm Chrome version is 86.0.4240.75 or higher in Settings > About Chrome.
📡 Detection & Monitoring
Log Indicators:
- Unusual intent handling in Chrome logs
- Unexpected navigation events
Network Indicators:
- Chrome connecting to unexpected domains after local app interaction
SIEM Query:
source="chrome" AND (event="intent_handled" OR event="navigation_bypass")
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1092453
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/
- https://www.debian.org/security/2021/dsa-4824
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1092453
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/
- https://www.debian.org/security/2021/dsa-4824