<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Chrome — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/chrome/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 02:21:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/chrome/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-use-after-free/</guid><description>A use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7359 describes a use-after-free vulnerability present in ANGLE (Almost Native Graphics Layer Engine), a crucial component of the Chromium open-source project. This vulnerability impacts applications that utilize the Chromium engine, most notably Google Chrome and Microsoft Edge. While the provided source does not give specific exploitation details, use-after-free vulnerabilities can allow for arbitrary code execution. Google Chrome has already addressed this vulnerability, and Microsoft Edge has incorporated the fix from Chromium. This vulnerability matters to defenders because successful exploitation could lead to compromise of the browser and potentially the underlying system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page containing JavaScript code that leverages a flaw in ANGLE&rsquo;s memory management.</li>
<li>A user visits the malicious web page through Chrome or Edge.</li>
<li>The JavaScript code triggers the use-after-free vulnerability by freeing a memory object in ANGLE and then attempting to access it again.</li>
<li>This memory corruption leads to a controlled crash or allows the attacker to overwrite memory with arbitrary data.</li>
<li>The attacker leverages the memory overwrite to inject malicious code into the browser process.</li>
<li>The injected code executes within the context of the browser, granting the attacker access to user data, cookies, and other sensitive information.</li>
<li>The attacker may then use this access to perform actions on behalf of the user, such as stealing credentials, installing malware, or spreading the attack to other systems.</li>
<li>The attacker achieves arbitrary code execution on the user&rsquo;s system, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploit of CVE-2026-7359 could allow an attacker to execute arbitrary code within the context of the affected browser (Chrome or Edge). This can lead to sensitive information disclosure, data theft, and potentially full system compromise. The scope of impact is broad, affecting any user who visits a malicious webpage while using a vulnerable version of Chrome or Edge. Since Chrome and Edge are widely used, this vulnerability poses a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious WebGL Usage</code> to identify potential exploitation attempts targeting ANGLE via WebGL.</li>
<li>Monitor web server logs for suspicious requests (cs-uri-query) that may be related to the exploitation of CVE-2026-7359.</li>
<li>Ensure that all Chrome and Edge installations are updated to the latest versions to patch CVE-2026-7359.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>edge</category><category>chrome</category><category>cve-2026-7359</category></item><item><title>Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-use-after-free/</guid><description>CVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7357 is a critical use-after-free vulnerability residing within the GPU component of the Chromium rendering engine. This flaw directly impacts Google Chrome and, due to Microsoft Edge&rsquo;s reliance on Chromium, also affects Edge users. A remote attacker could potentially exploit this vulnerability to execute arbitrary code on a targeted system. The vulnerability stems from improper memory management within the GPU processing routines. While the specific exploitation details are not provided in this brief, successful exploitation generally involves crafting malicious web content to trigger the vulnerability during GPU operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTML page containing JavaScript that triggers specific GPU functions.</li>
<li>User visits the malicious website using Chrome or Edge.</li>
<li>The browser&rsquo;s rendering engine processes the malicious JavaScript, leading to the allocation and subsequent freeing of a memory region in the GPU component.</li>
<li>The attacker&rsquo;s JavaScript code then attempts to access the previously freed memory region, triggering the use-after-free vulnerability.</li>
<li>By manipulating the memory layout, the attacker can overwrite the freed memory with controlled data.</li>
<li>The overwritten memory is later accessed by the GPU, leading to the execution of attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution within the context of the browser process.</li>
<li>The attacker leverages the code execution to escalate privileges or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7357 can lead to arbitrary code execution on the victim&rsquo;s machine. The attacker could potentially install malware, steal sensitive data, or take control of the affected system. Given the widespread use of Chrome and Edge, this vulnerability poses a significant risk to a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome to address CVE-2026-7357.</li>
<li>Apply the latest security updates for Microsoft Edge to address CVE-2026-7357.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WebAssembly Execution&rdquo; to identify potential exploitation attempts involving WebAssembly.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>edge</category><category>chrome</category></item><item><title>Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7338/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7338/</guid><description>CVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7338 is a critical use-after-free vulnerability residing within the Cast component of the Chromium browser engine. Google Chrome and Microsoft Edge (Chromium-based) are both affected by this flaw. While the provided source does not specify the exact vulnerable versions, it indicates that Microsoft Edge ingests Chromium, and thus is affected by vulnerabilities addressed in Chromium releases. Successful exploitation of this vulnerability could lead to arbitrary code execution in the context of the user running the browser. This poses a significant risk, as attackers could potentially gain control of the user&rsquo;s system. Defenders should prioritize patching affected browsers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage or injects malicious code into a legitimate website that utilizes the Cast functionality.</li>
<li>The victim visits the malicious website or interacts with the compromised legitimate website using an affected browser (Chrome or Edge).</li>
<li>The malicious webpage triggers the use-after-free vulnerability in the Cast component.</li>
<li>The vulnerability allows the attacker to access memory that has already been freed.</li>
<li>The attacker overwrites the freed memory with attacker-controlled data.</li>
<li>The attacker manipulates the memory layout to redirect program execution.</li>
<li>The browser attempts to execute code from the attacker-controlled memory location.</li>
<li>This results in arbitrary code execution within the context of the browser process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7338 allows an attacker to execute arbitrary code on a victim&rsquo;s machine. This can lead to complete system compromise, data theft, installation of malware, or other malicious activities. Given the widespread use of Chromium-based browsers like Chrome and Edge, this vulnerability has the potential to impact a large number of users across various sectors. The severity is critical due to the potential for remote code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome to address CVE-2026-7338 as detailed in Google Chrome Releases.</li>
<li>Apply the latest security updates for Microsoft Edge (Chromium-based) to address CVE-2026-7338, ensuring the ingested Chromium version contains the fix.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts targeting the Cast component.</li>
<li>Enable enhanced browser security features, such as sandboxing and site isolation, to limit the impact of potential exploits.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>chrome</category><category>edge</category><category>cve-2026-7338</category><category>remote code execution</category></item><item><title>Multiple Vulnerabilities in Google Chrome</title><link>https://feed.craftedsignal.io/briefs/2026-05-chrome-vulns/</link><pubDate>Thu, 30 Apr 2026 09:09:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chrome-vulns/</guid><description>Multiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple unspecified vulnerabilities have been identified in Google Chrome. An attacker exploiting these vulnerabilities could potentially execute arbitrary code, circumvent security measures, expose and manipulate sensitive information, and trigger a denial-of-service condition. The specifics of these vulnerabilities, including CVE identifiers, are not detailed in the source document. The lack of detail makes it difficult to determine the scope of the attack, but successful exploitation could lead to significant compromise of systems running Chrome. Defenders should prioritize monitoring for suspicious activity within Chrome processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable version of Google Chrome.</li>
<li>The attacker crafts a malicious web page or injects malicious code into a legitimate website.</li>
<li>A user visits the malicious web page or a compromised legitimate website using Google Chrome.</li>
<li>The attacker exploits a vulnerability in Chrome, such as a use-after-free or buffer overflow.</li>
<li>Successful exploitation allows the attacker to execute arbitrary code within the context of the Chrome process.</li>
<li>The attacker leverages the code execution to bypass security mechanisms like sandboxing.</li>
<li>The attacker gains access to sensitive data, such as cookies, browsing history, or credentials.</li>
<li>The attacker manipulates data or causes a denial-of-service condition by crashing the browser or consuming excessive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition. The impact ranges from data theft and credential compromise to complete system takeover, depending on the specific vulnerability and the attacker&rsquo;s objectives. While the exact number of potential victims is unknown, the widespread use of Chrome makes this a high-impact threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious child processes spawned by chrome.exe, especially those involving command-line interpreters or scripting engines. Use the &ldquo;Detect Suspicious Child Process of Chrome&rdquo; Sigma rule.</li>
<li>Inspect network connections originating from chrome.exe for unusual destinations or protocols. Deploy the &ldquo;Detect Outbound Connection from Chrome without User Interaction&rdquo; Sigma rule.</li>
<li>Implement web content filtering to block access to known malicious websites that might attempt to exploit Chrome vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chrome</category><category>vulnerability</category><category>code-execution</category><category>defense-evasion</category><category>information-disclosure</category><category>denial-of-service</category></item><item><title>Google Chrome V8 Type Confusion Vulnerability (CVE-2026-6363)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-v8-type-confusion/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-v8-type-confusion/</guid><description>A type confusion vulnerability (CVE-2026-6363) in Google Chrome's V8 JavaScript engine before version 147.0.7727.101 allows a remote attacker to potentially perform out-of-bounds memory access via a crafted HTML page.</description><content:encoded><![CDATA[<p>CVE-2026-6363 is a type confusion vulnerability affecting the V8 JavaScript engine within Google Chrome. This vulnerability resides in versions prior to 147.0.7727.101. A remote attacker could exploit this flaw by crafting a malicious HTML page designed to trigger the type confusion, leading to an out-of-bounds memory access. The Chromium security team rated this vulnerability as having medium severity. Successful exploitation could allow an attacker to potentially execute arbitrary code within the context of the browser. Defenders should prioritize patching vulnerable Chrome installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTML page containing JavaScript code designed to trigger the type confusion vulnerability in the V8 engine.</li>
<li>The victim visits the malicious HTML page, either by directly navigating to it or by being redirected through a phishing attack or drive-by download.</li>
<li>The victim&rsquo;s Chrome browser attempts to render the malicious HTML and execute the embedded JavaScript code.</li>
<li>The crafted JavaScript code exploits the type confusion vulnerability in the V8 engine, leading to an incorrect type assignment.</li>
<li>The type confusion results in an out-of-bounds memory access, allowing the attacker to read or write to arbitrary memory locations.</li>
<li>The attacker leverages the ability to read and write to arbitrary memory locations to inject and execute malicious code within the Chrome process.</li>
<li>The attacker gains control of the Chrome process and can perform actions such as stealing cookies, injecting keyloggers, or accessing sensitive information.</li>
<li>The attacker may pivot from the compromised browser to other systems on the network, depending on the environment and attacker objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6363 can lead to arbitrary code execution within the context of the Chrome browser. This could allow an attacker to steal sensitive information such as cookies, credentials, and browsing history. It can also lead to further compromise of the affected system and potentially other systems on the network. While the Chromium security severity is rated as Medium, the impact of successful exploitation can be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to version 147.0.7727.101 or later to patch CVE-2026-6363.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Chrome Process Memory Access</code> to detect potential exploitation attempts based on process memory access patterns.</li>
<li>Monitor web server logs for requests to unusual or suspicious HTML pages that could be used to deliver the exploit.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-6363</category><category>chrome</category><category>v8</category><category>type confusion</category></item><item><title>Google Chrome Turbofan Type Confusion Vulnerability (CVE-2026-6301)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-turbofan-type-confusion/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-turbofan-type-confusion/</guid><description>A type confusion vulnerability in Google Chrome's Turbofan component (CVE-2026-6301) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page, impacting system integrity and availability.</description><content:encoded><![CDATA[<p>CVE-2026-6301 describes a type confusion vulnerability affecting the Turbofan component in Google Chrome versions prior to 147.0.7727.101. The vulnerability allows a remote attacker to potentially execute arbitrary code within the Chrome sandbox. The attack is initiated by crafting a malicious HTML page that, when rendered by a vulnerable Chrome browser, triggers the type confusion in Turbofan. Successful exploitation could lead to arbitrary code execution, potentially allowing the attacker to gain control of the affected system or access sensitive information within the sandbox constraints. This vulnerability poses a significant risk to users browsing untrusted websites or opening malicious HTML files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTML page designed to trigger the type confusion vulnerability in Chrome&rsquo;s Turbofan.</li>
<li>The victim visits the attacker-controlled website hosting the malicious HTML page or opens a locally stored HTML file.</li>
<li>Chrome&rsquo;s rendering engine attempts to process the malicious HTML, triggering the Turbofan component responsible for JavaScript optimization.</li>
<li>The type confusion vulnerability is exploited due to the crafted HTML, leading to incorrect assumptions about object types during JavaScript execution.</li>
<li>The incorrect type assumptions allow the attacker to manipulate memory within the Chrome renderer process.</li>
<li>The attacker leverages the memory manipulation capabilities to inject and execute arbitrary code within the Chrome sandbox.</li>
<li>The attacker&rsquo;s code executes with the privileges of the Chrome renderer process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6301 allows a remote attacker to execute arbitrary code within the Chrome sandbox. While the sandbox provides some level of isolation, a determined attacker may be able to escape the sandbox and gain further access to the underlying system. The impact includes potential data theft, installation of malware, or complete system compromise, depending on the attacker&rsquo;s ability to bypass sandbox protections.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to version 147.0.7727.101 or later to patch CVE-2026-6301 (reference: <a href="https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html)">https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Script Execution via Chrome&rdquo; to identify potential exploitation attempts (reference: Sigma rule below).</li>
<li>Educate users about the risks of visiting untrusted websites and opening suspicious HTML files to prevent initial access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>type-confusion</category><category>code-execution</category><category>chrome</category></item><item><title>Google Chrome Sandbox Escape via Uninitialized Use in Accessibility (CVE-2026-6311)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-sandbox-escape/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-sandbox-escape/</guid><description>A remote attacker who has compromised the renderer process in Google Chrome on Windows prior to version 147.0.7727.101 can potentially perform a sandbox escape via a crafted HTML page due to an uninitialized use in accessibility, as tracked by CVE-2026-6311.</description><content:encoded><![CDATA[<p>CVE-2026-6311 describes a high-severity vulnerability affecting Google Chrome on Windows. Specifically, an uninitialized use in the Accessibility component exists in versions prior to 147.0.7727.101. This flaw allows a remote attacker, who has already compromised the renderer process, to potentially escape the browser&rsquo;s sandbox environment. The attacker exploits this vulnerability by crafting a malicious HTML page. Successful exploitation allows the attacker to execute code outside of the Chrome sandbox, potentially leading to arbitrary code execution on the underlying system. This vulnerability was patched in Chrome version 147.0.7727.101, released in April 2026. The Chromium project assigned a security severity of High to this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTML page designed to trigger the uninitialized use vulnerability in the Accessibility component.</li>
<li>The victim visits the malicious HTML page through a phishing link or drive-by download.</li>
<li>The HTML page is rendered by Google Chrome, which triggers the vulnerability in the Accessibility component.</li>
<li>Due to the uninitialized memory, the attacker gains control of a pointer or other sensitive data.</li>
<li>The attacker leverages this control to read from or write to arbitrary memory locations within the renderer process.</li>
<li>The attacker manipulates the memory of the renderer process to bypass sandbox restrictions.</li>
<li>The attacker gains the ability to execute arbitrary code outside of the Chrome sandbox.</li>
<li>The attacker can now perform actions such as installing malware, stealing sensitive data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6311 allows an attacker to escape the Google Chrome sandbox on Windows systems. This can lead to arbitrary code execution on the victim&rsquo;s machine, potentially leading to data theft, malware installation, or further compromise of the network. Given Chrome&rsquo;s widespread use, this vulnerability poses a significant risk to a large number of users. While the exact number of victims is unknown, the potential impact is high due to the ability to bypass the browser&rsquo;s security measures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to version 147.0.7727.101 or later to patch CVE-2026-6311 (reference: Overview).</li>
<li>Monitor process creation events for unexpected processes spawned by Chrome renderer processes, as a sign of successful sandbox escape (reference: Attack Chain step 8 and the &ldquo;Detect Chrome Sandbox Escape via Child Process&rdquo; Sigma rule).</li>
<li>Implement web filtering to block access to known malicious websites that may host exploit code targeting this vulnerability (reference: Attack Chain step 2).</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6311</category><category>chrome</category><category>sandbox-escape</category><category>windows</category></item><item><title>Google Chrome GPU Out-of-Bounds Write Vulnerability (CVE-2026-6314)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-gpu-oob-write/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-gpu-oob-write/</guid><description>Google Chrome versions prior to 147.0.7727.101 are vulnerable to an out-of-bounds write in the GPU process (CVE-2026-6314), allowing a remote attacker with GPU process compromise to potentially perform a sandbox escape via a crafted HTML page.</description><content:encoded><![CDATA[<p>CVE-2026-6314 is a security vulnerability affecting Google Chrome versions prior to 147.0.7727.101. The vulnerability resides within the GPU process and is classified as an out-of-bounds write. Successful exploitation could allow a remote attacker who has already compromised the GPU process to perform a sandbox escape, potentially gaining broader system access. The vulnerability can be triggered by a crafted HTML page. The Chromium security team has rated this vulnerability as High severity. This vulnerability was patched in the 147.0.7727.101 release.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTML page designed to trigger the out-of-bounds write in the GPU process.</li>
<li>The victim visits the malicious HTML page using a vulnerable version of Google Chrome.</li>
<li>The HTML page leverages JavaScript to initiate a GPU-related operation that triggers the vulnerable code path.</li>
<li>The GPU process attempts to write data outside of the intended memory buffer due to a flaw in the code.</li>
<li>This out-of-bounds write corrupts memory within the GPU process.</li>
<li>The attacker leverages the memory corruption to overwrite critical data structures or code within the GPU process.</li>
<li>By manipulating the GPU process&rsquo;s memory, the attacker attempts to escape the Chrome sandbox.</li>
<li>If successful, the attacker gains the ability to execute arbitrary code outside the sandbox, potentially compromising the user&rsquo;s system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6314 allows an attacker to escape the Chrome sandbox. This allows the attacker to potentially execute arbitrary code on the victim&rsquo;s machine. While the exact number of victims is unknown, all users of Google Chrome versions prior to 147.0.7727.101 are potentially vulnerable. A successful sandbox escape could lead to data theft, malware installation, or other malicious activities, depending on the privileges of the compromised user.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to version 147.0.7727.101 or later to patch CVE-2026-6314.</li>
<li>Deploy the Sigma rule <code>Detect Chrome GPU Process Crash</code> to identify potential exploitation attempts based on abnormal process termination.</li>
<li>Monitor web server logs for requests to suspicious HTML pages (cs-uri-query, cs-uri-stem) that could be used to deliver the exploit.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chrome</category><category>gpu</category><category>oob-write</category><category>sandbox-escape</category></item><item><title>Google Chrome CSS Use-After-Free Vulnerability (CVE-2026-6300)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-uaf/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-uaf/</guid><description>A use-after-free vulnerability in Google Chrome's CSS engine (CVE-2026-6300) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.</description><content:encoded><![CDATA[<p>CVE-2026-6300 is a use-after-free vulnerability affecting the CSS engine in Google Chrome versions prior to 147.0.7727.101. Successful exploitation allows a remote attacker to execute arbitrary code inside a sandbox environment. The vulnerability is triggered when processing a maliciously crafted HTML page. Google Chrome users who have not updated to version 147.0.7727.101 or later are vulnerable. Given the widespread use of Chrome, this vulnerability poses a significant risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTML page containing a specific CSS payload designed to trigger the use-after-free condition.</li>
<li>The victim visits the attacker-controlled website or opens the malicious HTML page via phishing or other social engineering techniques.</li>
<li>Chrome&rsquo;s rendering engine processes the HTML and CSS code.</li>
<li>The vulnerability in the CSS engine is triggered during the processing of the malicious CSS, leading to memory corruption.</li>
<li>The attacker leverages the use-after-free condition to overwrite memory and gain control of program execution.</li>
<li>The attacker executes arbitrary code within the Chrome sandbox.</li>
<li>The attacker potentially escalates privileges or escapes the sandbox environment, depending on further exploitation techniques.</li>
<li>The attacker performs malicious actions, such as installing malware, stealing sensitive data, or further compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6300 allows a remote attacker to execute arbitrary code within the Chrome sandbox. While the sandbox provides a degree of isolation, determined attackers may be able to escalate privileges or escape the sandbox entirely, leading to full system compromise. This could allow for the installation of malware, theft of sensitive data, or other malicious activities. Given the widespread use of Chrome, a successful exploit could potentially affect millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Update Google Chrome to version 147.0.7727.101 or later to patch CVE-2026-6300.</li>
<li>Deploy the following Sigma rule to detect potential exploitation attempts based on suspicious process creation events related to Chrome: <code>title: &quot;Detect Possible Chrome UAF Exploitation&quot;</code></li>
<li>Enable process creation logging for Google Chrome to ensure the Sigma rule functions correctly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6300</category><category>use-after-free</category><category>chrome</category></item><item><title>Google Chrome Proxy Use-After-Free Vulnerability (CVE-2026-6297)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-use-after-free/</link><pubDate>Wed, 15 Apr 2026 20:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-use-after-free/</guid><description>CVE-2026-6297 is a critical use-after-free vulnerability in the Proxy component of Google Chrome before version 147.0.7727.101, enabling a privileged network attacker to potentially achieve sandbox escape via a crafted HTML page.</description><content:encoded><![CDATA[<p>CVE-2026-6297 is a critical security flaw affecting Google Chrome users. The vulnerability, a use-after-free issue within the Proxy component, exists in versions prior to 147.0.7727.101. Successfully exploiting this vulnerability would allow an attacker positioned in a privileged network location to potentially break out of Chrome&rsquo;s sandbox. The attack vector involves a specially crafted HTML page delivered to the victim. This is a critical vulnerability because a successful exploit could lead to arbitrary code execution within the context of the user running Chrome, potentially leading to data theft, system compromise, or further lateral movement within a network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains a privileged network position, such as through ARP poisoning or DNS spoofing.</li>
<li>The victim user browses to a website or is redirected to a website controlled by the attacker.</li>
<li>The attacker injects a malicious HTML page into the victim&rsquo;s browser session.</li>
<li>The malicious HTML page leverages JavaScript to trigger the use-after-free vulnerability in Chrome&rsquo;s Proxy component.</li>
<li>The use-after-free condition allows the attacker to corrupt memory within the Chrome process.</li>
<li>By carefully crafting the memory corruption, the attacker gains control of program execution.</li>
<li>The attacker executes arbitrary code within the Chrome sandbox.</li>
<li>The attacker leverages the initial code execution within the sandbox to attempt a sandbox escape and gain access to the underlying operating system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6297 allows an attacker in a privileged network position to perform a sandbox escape. This can lead to arbitrary code execution on the user&rsquo;s machine, potentially compromising sensitive data, allowing for further exploitation of the system, and enabling lateral movement within the network. Due to the widespread use of Chrome, this vulnerability has the potential to affect a large number of users across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to version 147.0.7727.101 or later to patch CVE-2026-6297.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chrome Sandbox Escape via Crafted HTML&rdquo; to identify potential exploitation attempts within your environment.</li>
<li>Monitor network traffic for signs of ARP poisoning or DNS spoofing, which are common prerequisites for exploiting vulnerabilities like CVE-2026-6297.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>use-after-free</category><category>chrome</category><category>sandbox escape</category></item><item><title>Google Chrome Device Bound Session Credentials (DBSC) Mitigates Cookie Theft</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-cookie-protection/</link><pubDate>Fri, 10 Apr 2026 07:50:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-cookie-protection/</guid><description>Google's rollout of Device Bound Session Credentials (DBSC) in Chrome 146 for Windows, with a future release planned for macOS, cryptographically binds authentication sessions to the user's device, rendering stolen session cookies unusable and mitigating credential access.</description><content:encoded><![CDATA[<p>Google has introduced Device Bound Session Credentials (DBSC) in Chrome 146 for Windows to combat session cookie theft, with a macOS version planned for a future release. This feature, initially announced in April 2024, aims to protect user accounts from compromise by rendering stolen authentication cookies useless. Session cookies are often stolen using information-stealing malware and traded on cybercrime platforms, allowing attackers to access accounts without passwords. DBSC mitigates this threat by cryptographically binding authentication sessions to the user&rsquo;s device, leveraging hardware-backed security modules to generate unique public/private key pairs. This ensures that even if cookies are exfiltrated, they quickly expire and become unusable, enhancing overall security for Chrome users. Websites can adopt DBSC via registration and refresh endpoints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker deploys information-stealing malware on a victim&rsquo;s Windows or macOS system.</li>
<li>The malware gains access to the browser&rsquo;s local files and memory, where authentication cookies are stored.</li>
<li>The malware exfiltrates the stolen session cookies to a command-and-control server.</li>
<li>The attacker attempts to use the stolen session cookies to access the victim&rsquo;s accounts on various web platforms.</li>
<li>If DBSC is not implemented, the attacker successfully gains unauthorized access to the user&rsquo;s accounts.</li>
<li>If DBSC is implemented, Chrome checks for device-bound credentials.</li>
<li>The web server requires proof of possession of the private key associated with the session. Since the attacker lacks this key, the exfiltrated cookies are useless.</li>
<li>The attacker&rsquo;s attempt to access the account is blocked, preventing unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of stolen session cookies can lead to unauthorized access to user accounts across various platforms, potentially resulting in data breaches, financial loss, and reputational damage. While the article does not cite specific victim counts or sectors affected, the widespread use of Chrome and the prevalence of cookie-stealing malware makes this a significant threat. The implementation of DBSC aims to significantly reduce the risk of account compromise via stolen cookies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Detection engineers should familiarize themselves with the concept and deployment of Device Bound Session Credentials (DBSC) to understand its impact on existing detection strategies.</li>
<li>Monitor for the presence of information-stealing malware that targets browser cookie storage locations using <code>file_event</code> and <code>process_creation</code> log sources.</li>
<li>Consider deploying the Sigma rule to detect anomalous processes accessing browser cookie storage locations to identify potential cookie theft attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cookie-theft</category><category>credential-access</category><category>chrome</category></item><item><title>Google Chrome WebAudio Heap Buffer Overflow Vulnerability (CVE-2026-4673)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-webaudio-heap-overflow/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-webaudio-heap-overflow/</guid><description>A remote attacker can exploit a heap buffer overflow vulnerability (CVE-2026-4673) in Google Chrome's WebAudio component before version 146.0.7680.165 by crafting a malicious HTML page, potentially leading to an out-of-bounds memory write and arbitrary code execution.</description><content:encoded>&lt;p>CVE-2026-4673 is a heap buffer overflow vulnerability affecting the WebAudio component of Google Chrome. The vulnerability exists in versions prior to 146.0.7680.165. A remote attacker could exploit this vulnerability by crafting a malicious HTML page designed to trigger an out-of-bounds memory write. The Chromium security team has rated this vulnerability as High severity. Successful exploitation could allow an attacker to potentially execute arbitrary code within the context of the Chrome…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4673</category><category>chrome</category><category>webaudio</category><category>heap overflow</category><category>code execution</category></item><item><title>CVE-2026-4675: Google Chrome WebGL Heap Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-webgl-heap-overflow/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-webgl-heap-overflow/</guid><description>A heap buffer overflow vulnerability (CVE-2026-4675) exists in Google Chrome's WebGL implementation prior to version 146.0.7680.165, allowing a remote attacker to perform an out-of-bounds memory read via a specially crafted HTML page, potentially leading to information disclosure or arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-4675 describes a heap buffer overflow vulnerability affecting the WebGL component of Google Chrome. Specifically, versions prior to 146.0.7680.165 are susceptible. An attacker can exploit this vulnerability by crafting a malicious HTML page that, when rendered by a vulnerable Chrome browser, triggers an out-of-bounds memory read due to the heap buffer overflow in WebGL. The Chromium security team rated this as a &ldquo;High&rdquo; severity issue. Successful exploitation can lead to information…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4675</category><category>heap-buffer-overflow</category><category>webgl</category><category>chrome</category><category>remote-code-execution</category></item><item><title>Google Chrome WebGPU Use-After-Free Vulnerability (CVE-2026-4678)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-webgpu-uaf/</link><pubDate>Tue, 24 Mar 2026 01:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-webgpu-uaf/</guid><description>A use-after-free vulnerability in Google Chrome's WebGPU component (CVE-2026-4678) allows a remote attacker to execute arbitrary code within a sandbox by crafting a malicious HTML page, affecting Chrome versions prior to 146.0.7680.165.</description><content:encoded>&lt;p>CVE-2026-4678 is a use-after-free vulnerability impacting Google Chrome versions earlier than 146.0.7680.165. The vulnerability resides within the WebGPU component, a modern graphics API. An unauthenticated, remote attacker can exploit this flaw by enticing a user to open a specially crafted HTML page. Successful exploitation allows the attacker to execute arbitrary code inside the Chrome sandbox. The Chromium project rates this as a High severity issue due to the potential for arbitrary code…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4678</category><category>use-after-free</category><category>chrome</category><category>webgpu</category></item><item><title>Google Chrome WebAudio Out-of-Bounds Read Vulnerability (CVE-2026-4677)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-webaudio-oob-read/</link><pubDate>Tue, 24 Mar 2026 01:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-webaudio-oob-read/</guid><description>A remote attacker can trigger an out-of-bounds memory read in Google Chrome's WebAudio implementation by crafting a malicious HTML page (CVE-2026-4677), affecting versions prior to 146.0.7680.165.</description><content:encoded>&lt;p>CVE-2026-4677 describes an out-of-bounds memory read vulnerability in the WebAudio component of Google Chrome. Successful exploitation of this vulnerability allows a remote attacker to potentially read sensitive information from the browser&amp;rsquo;s memory. The vulnerability exists in Google Chrome versions prior to 146.0.7680.165. The attack involves crafting a malicious HTML page that, when opened in a vulnerable version of Chrome, triggers the out-of-bounds read in the WebAudio processing. The…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4677</category><category>chrome</category><category>webaudio</category><category>out-of-bounds read</category></item><item><title>Google Chrome Use-After-Free Vulnerability (CVE-2026-4676)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-uaf/</link><pubDate>Tue, 24 Mar 2026 01:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-uaf/</guid><description>A use-after-free vulnerability (CVE-2026-4676) in Google Chrome before 146.0.7680.165 allows a remote attacker to potentially perform a sandbox escape via a crafted HTML page.</description><content:encoded>&lt;p>CVE-2026-4676 is a use-after-free vulnerability affecting Google Chrome versions prior to 146.0.7680.165. This flaw resides within the Dawn component of Chrome and can be triggered by a remote attacker who crafts a malicious HTML page. Successful exploitation could lead to a sandbox escape, granting the attacker elevated privileges within the system. This vulnerability was patched in the March 23, 2026 stable channel update for desktop. The vulnerability affects users on Windows, Linux, and…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>sandbox-escape</category><category>chrome</category><category>cve-2026-4676</category></item><item><title>Google Chrome Font Integer Overflow Vulnerability (CVE-2026-4679)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-font-overflow/</link><pubDate>Tue, 24 Mar 2026 01:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-font-overflow/</guid><description>A remote attacker can perform an out-of-bounds memory write on Google Chrome by exploiting an integer overflow in the Fonts component via a crafted HTML page in versions prior to 146.0.7680.165.</description><content:encoded>&lt;p>CVE-2026-4679 is an integer overflow vulnerability affecting the Fonts component in Google Chrome versions prior to 146.0.7680.165. A remote attacker can exploit this vulnerability by crafting a malicious HTML page that, when rendered by a vulnerable Chrome browser, triggers an integer overflow condition, leading to an out-of-bounds memory write. This vulnerability exists because of insufficient validation when handling font data. Successful exploitation could lead to arbitrary code execution…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4679</category><category>chrome</category><category>integer-overflow</category><category>memory-corruption</category></item><item><title>Google Chrome FedCM Use-After-Free Vulnerability (CVE-2026-4680)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-fedcm-uaf/</link><pubDate>Tue, 24 Mar 2026 01:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-fedcm-uaf/</guid><description>A use-after-free vulnerability in Google Chrome's FedCM component (CVE-2026-4680) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.</description><content:encoded>&lt;p>A use-after-free vulnerability, identified as CVE-2026-4680, exists in the FedCM implementation of Google Chrome. This flaw affects versions prior to 146.0.7680.165. Exploitation is possible by a remote attacker who crafts a malicious HTML page. Successful exploitation allows for arbitrary code execution within the Chrome sandbox, potentially leading to further compromise. The Chromium security team has rated this vulnerability as High severity. This issue impacts users across Windows, Linux…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-4680</category><category>use-after-free</category><category>chrome</category><category>fedcm</category></item><item><title>Google Chrome Out-of-Bounds Read Vulnerability (CVE-2026-4674)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-oob-read/</link><pubDate>Tue, 24 Mar 2026 01:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-oob-read/</guid><description>A remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-4674) in Google Chrome versions prior to 146.0.7680.165 to achieve out-of-bounds memory access via a crafted HTML page, impacting confidentiality, integrity, and availability.</description><content:encoded>&lt;p>CVE-2026-4674 is an out-of-bounds read vulnerability affecting Google Chrome versions prior to 146.0.7680.165. This vulnerability resides in the CSS processing engine of Chrome. A remote attacker can exploit this vulnerability by crafting a malicious HTML page that, when opened in a vulnerable version of Chrome, triggers an out-of-bounds read. The successful exploitation of this vulnerability allows the attacker to read sensitive information from the browser&amp;rsquo;s memory, potentially leading to…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>out-of-bounds read</category><category>chrome</category></item><item><title>VoidStealer Steals Secrets by Debugging Chrome</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-voidstealer-chrome-debugging/</link><pubDate>Fri, 20 Mar 2026 05:48:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-voidstealer-chrome-debugging/</guid><description>VoidStealer leverages Chrome debugging capabilities to extract sensitive information, such as credentials and session cookies, directly from the browser's memory.</description><content:encoded><![CDATA[<p>VoidStealer is a threat actor utilizing advanced techniques to extract sensitive information from Google Chrome. This is achieved by abusing Chrome&rsquo;s built-in debugging features. The threat actor&rsquo;s primary goal is to steal credentials, session cookies, and potentially other sensitive data stored within the browser&rsquo;s memory. This allows for account takeover and lateral movement within compromised environments. The technique bypasses traditional security measures, as it operates within a legitimate browser process. This activity started being discussed in open source forums around March 2026 and represents a sophisticated approach to browser credential theft.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through an unspecified method (e.g., malware distribution, social engineering).</li>
<li>The attacker deploys VoidStealer, a custom tool or script designed to interface with Chrome&rsquo;s debugging API.</li>
<li>VoidStealer identifies running Chrome processes and attaches itself as a debugger.</li>
<li>The tool leverages the debugging interface to inspect Chrome&rsquo;s memory space.</li>
<li>VoidStealer searches for specific data structures and memory regions known to store credentials, session cookies, and other sensitive information.</li>
<li>The attacker extracts the targeted data from Chrome&rsquo;s memory.</li>
<li>Stolen data is exfiltrated to a command-and-control server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials and session cookies for account takeover, lateral movement, and potentially data exfiltration from other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful VoidStealer attacks can lead to significant data breaches, account takeovers, and financial losses. Organizations in any sector are at risk, especially those that heavily rely on web-based applications and services. The compromise of user credentials allows attackers to gain unauthorized access to sensitive corporate resources, intellectual property, and customer data. If successful, this can also lead to follow-on attacks, such as ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for unexpected tools attaching to Chrome processes as debuggers to identify potential VoidStealer activity. Deploy the &ldquo;Suspicious Chrome Debugging Attachment&rdquo; Sigma rule to your SIEM.</li>
<li>Implement strict process whitelisting policies to prevent unauthorized applications from running on endpoints.</li>
<li>Enable and review Chrome&rsquo;s built-in security features, such as password protection and safe browsing, to mitigate the risk of credential theft.</li>
<li>Educate users about the risks of downloading and executing untrusted software.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>credential-theft</category><category>chrome</category><category>debugging</category></item><item><title>CISA Adds Google Skia and Chromium V8 Vulnerabilities to KEV Catalog</title><link>https://feed.craftedsignal.io/briefs/2026-03-cisa-kev-google-vulnerabilities/</link><pubDate>Sat, 14 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cisa-kev-google-vulnerabilities/</guid><description>CISA added CVE-2026-3909, an out-of-bounds write vulnerability in Google Skia, and CVE-2026-3910, an unspecified vulnerability in Google Chromium V8 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, highlighting the need for timely remediation.</description><content:encoded>&lt;p>On March 13, 2026, CISA added CVE-2026-3909, an out-of-bounds write vulnerability in Google Skia, and CVE-2026-3910, an unspecified vulnerability in Google Chromium V8, to its Known Exploited Vulnerabilities (KEV) Catalog. These vulnerabilities are actively being exploited in the wild and are considered frequent attack vectors. While CISA&amp;rsquo;s BOD 22-01 mandates Federal Civilian Executive Branch (FCEB) agencies to remediate these vulnerabilities, CISA strongly urges all organizations to prioritize…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>vulnerability</category><category>chrome</category><category>skia</category><category>cve-2026-3909</category><category>cve-2026-3910</category></item><item><title>Unauthorized Access to Chrome Local State File</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-localstate-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-localstate-access/</guid><description>Detection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to the Chrome &lsquo;Local State&rsquo; file, a critical component of the Chrome browser that stores settings and, more importantly, the encrypted master key used to protect saved passwords. The &lsquo;Local State&rsquo; file is typically accessed only by the Chrome browser itself. When other processes attempt to read this file, it&rsquo;s a strong indicator of malicious activity, potentially involving credential theft or reconnaissance by malware such as RedLine Stealer. This analytic leverages Windows Security Event logs, specifically event code 4663, to identify this behavior. Detecting and responding to this activity is crucial for preventing attackers from gaining access to sensitive user credentials stored within the Chrome browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, often through phishing or exploitation of a software vulnerability (not specified in this advisory).</li>
<li>Malware is deployed on the victim machine (e.g., RedLine Stealer).</li>
<li>The malware attempts to locate the Chrome &lsquo;Local State&rsquo; file, typically found at <code>*\\AppData\\Local\\Google\\Chrome\\User Data\\Local State</code>.</li>
<li>The malware process accesses the &lsquo;Local State&rsquo; file, triggering a Windows Security Event 4663.</li>
<li>The malware extracts the encrypted master key from the &lsquo;Local State&rsquo; file.</li>
<li>The malware decrypts the master key using attacker-controlled methods.</li>
<li>The decrypted master key is used to decrypt saved passwords stored by Chrome.</li>
<li>The stolen credentials are exfiltrated to the attacker&rsquo;s command and control server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal user credentials stored in the Chrome browser. This can lead to unauthorized access to email accounts, social media profiles, banking websites, and other sensitive online services. The impact could range from identity theft and financial fraud to corporate espionage and data breaches. The number of potential victims depends on the number of systems compromised and the extent of Chrome usage on those systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure auditing for both &ldquo;Success&rdquo; and &ldquo;Failure&rdquo; events to ensure Windows Security Event 4663 is generated for file access, as described in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chrome Local State File Access by Non-Chrome Processes&rdquo; to your SIEM to detect unauthorized access attempts (see &ldquo;rules&rdquo; section). Tune the rule&rsquo;s filter list to reduce false positives related to legitimate software uninstallers.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process name and path involved in accessing the &lsquo;Local State&rsquo; file, as described in the rule&rsquo;s description.</li>
<li>Consider implementing network egress filtering to prevent exfiltration of stolen credentials to known malicious command and control servers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>password-stealing</category><category>chrome</category></item></channel></rss>