CVE-2021-4052

8.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Google Chrome's web app component that allows heap corruption. Attackers can exploit it by tricking users into installing malicious Chrome extensions, potentially leading to arbitrary code execution. All Chrome users prior to version 96.0.4664.93 are affected.

💻 Affected Systems

Products:
  • Google Chrome
Versions: All versions prior to 96.0.4664.93
Operating Systems: Windows, Linux, macOS, Chrome OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Chrome browser, not Chromium-based browsers unless they share the vulnerable code. Requires user to install a malicious extension.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the Chrome process, potentially leading to full system compromise.

🟠

Likely Case

Browser crash or limited data exfiltration through malicious extension capabilities.

🟢

If Mitigated

No impact if Chrome is updated or malicious extensions are prevented from installation.

🌐 Internet-Facing: HIGH - Attackers can host malicious extensions online and trick users into installing them.
🏢 Internal Only: MEDIUM - Requires user interaction to install malicious extensions, but internal phishing could facilitate this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires convincing a user to install a malicious Chrome extension, which adds a social engineering component. The use-after-free to heap corruption chain requires technical sophistication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 96.0.4664.93

Vendor Advisory: https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click the three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for updates and install version 96.0.4664.93 or later. 4. Click 'Relaunch' to restart Chrome.

🔧 Temporary Workarounds

Disable Chrome Extension Installation

all

Prevent users from installing Chrome extensions through enterprise policies or browser settings.

For enterprise: Configure Chrome policy 'ExtensionInstallBlocklist' to '*' or 'ExtensionInstallAllowlist' to approved extensions only.

Restrict Extension Sources

all

Only allow extensions from the Chrome Web Store via enterprise policy.

Configure Chrome policy 'ExtensionInstallSources' to only allow 'https://chrome.google.com/webstore/*'.

🧯 If You Can't Patch

  • Disable or uninstall all non-essential Chrome extensions to reduce attack surface.
  • Use alternative browsers until Chrome can be updated.

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: if below 96.0.4664.93, the system is vulnerable.

Check Version:

On command line: google-chrome --version (Linux) or 'chrome://version' in Chrome address bar.

Verify Fix Applied:

Confirm Chrome version is 96.0.4664.93 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash logs with memory corruption errors
  • Unexpected installation of Chrome extensions from non-store sources

Network Indicators:

  • Downloads of .crx files from untrusted sources
  • Connections to known malicious extension hosting domains

SIEM Query:

Example: 'source="chrome_install.log" AND (extension_install OR .crx) NOT domain="chrome.google.com"'

🔗 References

📤 Share & Export