CVE-2020-6554
📋 TL;DR
This is a use-after-free vulnerability in Chrome's extension system that allows a remote attacker to escape Chrome's sandbox via a malicious extension. It affects all Chrome users running versions before 84.0.4147.125. Successful exploitation could lead to arbitrary code execution on the host system.
💻 Affected Systems
- Google Chrome
- Chromium-based browsers
📦 What is this software?
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via sandbox escape leading to arbitrary code execution with user privileges, potentially enabling persistence, data theft, and lateral movement.
Likely Case
Local privilege escalation allowing malicious extensions to break out of Chrome's security sandbox and execute code on the host operating system.
If Mitigated
No impact if Chrome is fully patched or if extension installation is restricted to trusted sources only.
🎯 Exploit Status
Exploit requires user to install a malicious extension. The bug report (crbug.com/1094235) contains technical details that could aid exploitation. Sandbox escape vulnerabilities are highly valuable to attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 84.0.4147.125 and later
Vendor Advisory: https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Chrome and click the three-dot menu > Help > About Google Chrome. 2. Chrome will automatically check for updates and install version 84.0.4147.125 or later. 3. Click 'Relaunch' to restart Chrome with the fix applied.
🔧 Temporary Workarounds
Disable extension installation
allPrevent users from installing new extensions to block the attack vector
For enterprise: Use Chrome policies to restrict extension installation via Group Policy or MDM
Restrict extension sources
allOnly allow extensions from Chrome Web Store
chrome://settings > Extensions > Check 'Allow from Chrome Web Store only'
🧯 If You Can't Patch
- Implement application whitelisting to block Chrome execution entirely
- Use network filtering to block access to untrusted extension sources and update servers
🔍 How to Verify
Check if Vulnerable:
Check Chrome version: If version is less than 84.0.4147.125, system is vulnerable.
Check Version:
On Chrome: chrome://version/ or Command Line: google-chrome --version
Verify Fix Applied:
Confirm Chrome version is 84.0.4147.125 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual extension installation events
- Chrome crash reports with extension-related memory errors
- Process creation from Chrome with unusual parent-child relationships
Network Indicators:
- Downloads of .crx files from untrusted sources
- Chrome extension update requests to non-Google domains
SIEM Query:
source="chrome_extension_logs" AND (event="install" OR event="update") AND extension_id NOT IN [approved_list]
🔗 References
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1094235
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/
- https://www.debian.org/security/2021/dsa-4824
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1094235
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/
- https://www.debian.org/security/2021/dsa-4824