CVE-2021-30528

8.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Chrome's WebAuthentication API on Android that allows heap corruption. Attackers who compromise the renderer process can exploit it via crafted HTML pages to potentially execute arbitrary code. Only affects Android users with saved credit cards in their Google account who run Chrome versions before 91.0.4472.77.

💻 Affected Systems

Products:
  • Google Chrome
Versions: All versions prior to 91.0.4472.77
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users who have saved credit card information in their Google account. Desktop Chrome and other platforms are not affected.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full sandbox escape leading to arbitrary code execution with renderer process privileges, potentially compromising the entire device.

🟠

Likely Case

Limited impact due to the specific requirement of renderer process compromise and saved credit card data, but could lead to data theft or further privilege escalation.

🟢

If Mitigated

Minimal impact if Chrome is updated, sandboxing works properly, and users don't have saved payment information.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires renderer process compromise first, then exploitation via crafted HTML page. Proof-of-concept details available in security publications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 91.0.4472.77

Vendor Advisory: https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html

Restart Required: Yes

Instructions:

1. Open Google Play Store 2. Search for Chrome 3. Tap Update if available 4. Alternatively, enable auto-updates in Play Store settings 5. Restart Chrome after update

🔧 Temporary Workarounds

Disable saved payment methods

android

Remove saved credit cards from Google account to eliminate attack vector

Open Chrome settings > Payment methods > Remove saved cards

Use alternative browser

android

Temporarily switch to a different browser until Chrome is updated

🧯 If You Can't Patch

  • Implement network filtering to block malicious HTML pages
  • Use application control to restrict Chrome usage to trusted sites only

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in Settings > About Chrome. If version is below 91.0.4472.77, system is vulnerable.

Check Version:

chrome://version/ in Chrome address bar

Verify Fix Applied:

Confirm Chrome version is 91.0.4472.77 or higher in Settings > About Chrome.

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with WebAuthentication-related stack traces
  • Unexpected renderer process terminations

Network Indicators:

  • Unusual HTML page loads triggering WebAuthentication API calls
  • Suspicious iframe or script loads

SIEM Query:

source="chrome_crash_reports" AND (process="renderer" OR module="WebAuthentication")

🔗 References

📤 Share & Export