CVE-2020-6402
📋 TL;DR
This vulnerability in Google Chrome on macOS allows attackers to execute arbitrary code by convincing users to install a malicious extension. It affects Chrome users on macOS who haven't updated to version 80.0.3987.87 or later. The insufficient policy enforcement in downloads enables extension-based code execution.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Backports Sle by Opensuse
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining complete control over the victim's system, data theft, and persistent backdoor installation.
Likely Case
Malicious extension installation leading to data exfiltration, credential theft, and limited system access.
If Mitigated
No impact if Chrome is updated to patched version or if users don't install malicious extensions.
🎯 Exploit Status
Requires social engineering to convince user to install malicious extension. No public exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 80.0.3987.87
Vendor Advisory: https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome 2. Click Chrome menu → About Google Chrome 3. Chrome will automatically check for updates 4. If update available, click 'Relaunch' 5. Verify version is 80.0.3987.87 or higher
🔧 Temporary Workarounds
Disable extension installation
allPrevent users from installing Chrome extensions
chrome://settings/extensions → Toggle 'Allow extensions from other stores' to OFF
Use enterprise policies
allConfigure Chrome via enterprise policies to restrict extension installation
Configure ExtensionInstallBlacklist and ExtensionInstallWhitelist policies
🧯 If You Can't Patch
- Implement strict extension whitelisting policies
- Educate users about risks of installing unknown extensions
🔍 How to Verify
Check if Vulnerable:
Check Chrome version in About Google Chrome. If version is below 80.0.3987.87, system is vulnerable.
Check Version:
google-chrome --version
Verify Fix Applied:
Verify Chrome version is 80.0.3987.87 or higher in About Google Chrome.
📡 Detection & Monitoring
Log Indicators:
- Unusual extension installation events
- Chrome crash reports with extension-related errors
Network Indicators:
- Downloads from suspicious extension sources
- Unusual outbound connections after extension installation
SIEM Query:
source="chrome_logs" AND (event="extension_install" AND extension_id NOT IN [approved_list])
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
- https://access.redhat.com/errata/RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1029375
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4638
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
- https://access.redhat.com/errata/RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1029375
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
- https://security.gentoo.org/glsa/202003-08
- https://www.debian.org/security/2020/dsa-4638