CVE-2020-16007

7.8 HIGH

📋 TL;DR

This vulnerability in Google Chrome's installer allows a local attacker to potentially elevate privileges by exploiting insufficient data validation when handling crafted filesystem paths. It affects Chrome users on Windows systems prior to version 86.0.4240.183. An attacker with local access could execute arbitrary code with higher privileges than intended.

💻 Affected Systems

Products:
  • Google Chrome
Versions: Prior to 86.0.4240.183
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Primarily affects Windows installations. Linux and macOS may be affected but the exploit path is Windows-specific. Requires local access to the system.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local attacker elevates from standard user to administrator privileges, allowing installation of malware, modification of system settings, or access to protected resources.

🟢

If Mitigated

With proper user account controls and least privilege principles, impact is limited to the user's own context with no privilege escalation.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to gain elevated privileges on their workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of filesystem manipulation. No public exploit code has been released, but the vulnerability is well-documented in the Chromium bug tracker.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 86.0.4240.183

Vendor Advisory: https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Chrome and click the three-dot menu. 2. Go to Help > About Google Chrome. 3. Chrome will automatically check for updates and install version 86.0.4240.183 or later. 4. Click 'Relaunch' to restart Chrome with the update.

🔧 Temporary Workarounds

Disable Chrome auto-updates temporarily

windows

Prevents Chrome from automatically updating while you prepare for manual update, though this is not recommended long-term.

Windows: Use Group Policy or registry to disable auto-update

Run Chrome with limited privileges

all

Run Chrome as a standard user without administrative rights to limit potential impact.

🧯 If You Can't Patch

  • Implement strict user account control policies to limit standard user privileges
  • Monitor for unusual process creation or privilege escalation attempts using endpoint detection tools

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: Open Chrome, go to Help > About Google Chrome. If version is below 86.0.4240.183, you are vulnerable.

Check Version:

Windows: "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --version

Verify Fix Applied:

Confirm Chrome version is 86.0.4240.183 or higher in About Google Chrome page.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing Chrome installer processes with unusual parameters
  • Unexpected privilege escalation events from chrome.exe or chrome_installer.exe

Network Indicators:

  • Not applicable - local attack only

SIEM Query:

Process creation where (parent_process contains 'chrome' OR image contains 'chrome_installer') AND (integrity_level changes OR token_elevation_type changes)

🔗 References

📤 Share & Export