CVE-2020-6573

9.6 CRITICAL

📋 TL;DR

This is a use-after-free vulnerability in Google Chrome's video component on Android that allows a remote attacker who has already compromised the renderer process to potentially escape the browser sandbox. It affects Android users running Chrome versions prior to 85.0.4183.102. Successful exploitation could lead to full system compromise.

💻 Affected Systems

Products:
  • Google Chrome
Versions: Prior to 85.0.4183.102
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Chrome on Android; desktop versions are not vulnerable. Requires renderer process compromise first.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the Android device, potentially installing persistent malware, stealing sensitive data, and using the device as a pivot point into internal networks.

🟠

Likely Case

Sandbox escape leading to arbitrary code execution with system-level privileges, allowing installation of additional malware, credential theft, and surveillance capabilities.

🟢

If Mitigated

Limited to renderer process compromise only, preventing system-level access if sandbox escape fails or proper mitigations are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires chaining with another vulnerability to first compromise the renderer process. The sandbox escape component is the critical piece.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 85.0.4183.102 and later

Vendor Advisory: https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Google Play Store on Android device. 2. Search for 'Chrome'. 3. If update is available, tap 'Update'. 4. Restart Chrome after update completes.

🔧 Temporary Workarounds

Disable Chrome or Use Alternative Browser

android

Temporarily disable Chrome or switch to an alternative browser until patched.

🧯 If You Can't Patch

  • Restrict Chrome usage to trusted websites only
  • Implement network segmentation to isolate vulnerable devices

🔍 How to Verify

Check if Vulnerable:

Open Chrome, go to Settings > About Chrome, check if version is below 85.0.4183.102

Check Version:

chrome://version/ in Chrome address bar

Verify Fix Applied:

Confirm Chrome version is 85.0.4183.102 or higher in Settings > About Chrome

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with video component errors
  • Unusual process creation from Chrome renderer

Network Indicators:

  • Unusual outbound connections from Chrome processes
  • Traffic to known exploit hosting domains

SIEM Query:

process_name:chrome.exe AND (event_id:1000 OR event_id:1001) AND message:*video* OR process_parent:chrome.exe AND process_name NOT IN (chrome.exe, WerFault.exe)

🔗 References

📤 Share & Export