CVE-2020-16043
📋 TL;DR
This vulnerability in Google Chrome's networking component allows remote attackers to bypass discretionary access control through malicious network traffic. It affects Chrome users on all platforms who haven't updated to version 87.0.4280.141 or later. Attackers could potentially gain unauthorized access to protected resources.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through privilege escalation, allowing attackers to bypass security controls and access sensitive data or execute arbitrary code.
Likely Case
Unauthorized access to protected network resources, data exfiltration, or lateral movement within a network environment.
If Mitigated
Limited impact with proper network segmentation and access controls, potentially only affecting isolated browser instances.
🎯 Exploit Status
Exploitation requires network access and ability to send malicious traffic to the target.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 87.0.4280.141
Vendor Advisory: https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome browser. 2. Click the three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the update.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Chrome instances from sensitive network resources using firewall rules and network segmentation.
Browser Sandboxing
allRun Chrome in a sandboxed environment or virtual machine to limit potential impact.
🧯 If You Can't Patch
- Implement strict network access controls and segmentation to limit Chrome's network access
- Use alternative browsers until patching is possible
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in browser settings (chrome://settings/help) and compare to affected version range.
Check Version:
google-chrome --version (Linux) or check chrome://version in browser
Verify Fix Applied:
Verify Chrome version is 87.0.4280.141 or later in browser settings.
📡 Detection & Monitoring
Log Indicators:
- Unusual network connections from Chrome processes
- Access violations in system logs
Network Indicators:
- Suspicious network traffic patterns to/from Chrome instances
- Unexpected protocol usage
SIEM Query:
source="chrome" AND (event_type="network_access" OR event_type="security_violation")
🔗 References
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1148309
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VVUWIJKZTZTG6G475OR6PP4WPQBVM6PS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6P6AVVFP7B2M4H7TJQBASRZIBLOTUFN/
- https://security.gentoo.org/glsa/202101-05
- https://www.debian.org/security/2021/dsa-4832
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1148309
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VVUWIJKZTZTG6G475OR6PP4WPQBVM6PS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6P6AVVFP7B2M4H7TJQBASRZIBLOTUFN/
- https://security.gentoo.org/glsa/202101-05
- https://www.debian.org/security/2021/dsa-4832