CVE-2020-6573
📋 TL;DR
This is a use-after-free vulnerability in Google Chrome's video component on Android that allows a remote attacker who has already compromised the renderer process to potentially escape the browser sandbox. It affects Android users running Chrome versions prior to 85.0.4183.102. Successful exploitation could lead to full system compromise.
💻 Affected Systems
- Google Chrome
📦 What is this software?
Backports Sle by Opensuse
Backports Sle by Opensuse
Chrome by Google
Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...
Learn more about Chrome →Fedora by Fedoraproject
Fedora by Fedoraproject
Leap by Opensuse
Leap by Opensuse
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control over the Android device, potentially installing persistent malware, stealing sensitive data, and using the device as a pivot point into internal networks.
Likely Case
Sandbox escape leading to arbitrary code execution with system-level privileges, allowing installation of additional malware, credential theft, and surveillance capabilities.
If Mitigated
Limited to renderer process compromise only, preventing system-level access if sandbox escape fails or proper mitigations are in place.
🎯 Exploit Status
Requires chaining with another vulnerability to first compromise the renderer process. The sandbox escape component is the critical piece.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 85.0.4183.102 and later
Vendor Advisory: https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
Restart Required: Yes
Instructions:
1. Open Google Play Store on Android device. 2. Search for 'Chrome'. 3. If update is available, tap 'Update'. 4. Restart Chrome after update completes.
🔧 Temporary Workarounds
Disable Chrome or Use Alternative Browser
androidTemporarily disable Chrome or switch to an alternative browser until patched.
🧯 If You Can't Patch
- Restrict Chrome usage to trusted websites only
- Implement network segmentation to isolate vulnerable devices
🔍 How to Verify
Check if Vulnerable:
Open Chrome, go to Settings > About Chrome, check if version is below 85.0.4183.102
Check Version:
chrome://version/ in Chrome address bar
Verify Fix Applied:
Confirm Chrome version is 85.0.4183.102 or higher in Settings > About Chrome
📡 Detection & Monitoring
Log Indicators:
- Chrome crash reports with video component errors
- Unusual process creation from Chrome renderer
Network Indicators:
- Unusual outbound connections from Chrome processes
- Traffic to known exploit hosting domains
SIEM Query:
process_name:chrome.exe AND (event_id:1000 OR event_id:1001) AND message:*video* OR process_parent:chrome.exe AND process_name NOT IN (chrome.exe, WerFault.exe)
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1116304
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/
- https://security.gentoo.org/glsa/202101-30
- https://www.debian.org/security/2021/dsa-4824
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1116304
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/
- https://security.gentoo.org/glsa/202101-30
- https://www.debian.org/security/2021/dsa-4824