CVE-2020-6493
📋 TL;DR
This is a use-after-free vulnerability in Chrome's WebAuthentication API that allows a remote attacker who has already compromised the renderer process to potentially escape the browser sandbox. It affects Google Chrome versions prior to 83.0.4103.97. Users who visit malicious websites with vulnerable Chrome versions are at risk.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Backports by Opensuse
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Leap by Opensuse
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through sandbox escape, allowing attacker to execute arbitrary code with system privileges.
Likely Case
Privilege escalation from compromised renderer process to higher privilege processes, potentially leading to data theft or further system compromise.
If Mitigated
Limited to renderer process compromise only, preventing system-level access.
🎯 Exploit Status
Requires renderer process compromise first, then sandbox escape. No public exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 83.0.4103.97 and later
Vendor Advisory: https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome. 2. Click menu (three dots) → Help → About Google Chrome. 3. Chrome will automatically check for updates and install version 83.0.4103.97 or later. 4. Click Relaunch to restart Chrome.
🔧 Temporary Workarounds
Disable WebAuthentication API
allTemporarily disable the vulnerable WebAuthentication API component
chrome://flags/#enable-webauth
Set to 'Disabled'
Use Chrome Enterprise policies
allConfigure Chrome Enterprise policies to restrict WebAuthentication usage
Configure 'WebAuthenticationRemoteProxiedRequestsAllowed' policy to false
🧯 If You Can't Patch
- Use alternative browsers until Chrome can be updated
- Implement strict web filtering to block malicious sites
🔍 How to Verify
Check if Vulnerable:
Check Chrome version: if below 83.0.4103.97, system is vulnerable.
Check Version:
chrome://version/ or 'google-chrome --version' (Linux), 'Get-AppxPackage -Name Google.Chrome' (Windows PowerShell)
Verify Fix Applied:
Confirm Chrome version is 83.0.4103.97 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Chrome crash reports with WebAuthentication-related stack traces
- Unexpected renderer process termination
Network Indicators:
- Connections to known malicious domains hosting exploit code
- Unusual WebAuthentication API requests
SIEM Query:
source="chrome" AND (event="crash" OR event="process_termination") AND component="WebAuthentication"
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html
- https://crbug.com/1082105
- https://security.gentoo.org/glsa/202006-02
- https://www.debian.org/security/2020/dsa-4714
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html
- https://crbug.com/1082105
- https://security.gentoo.org/glsa/202006-02
- https://www.debian.org/security/2020/dsa-4714