<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Google Chrome — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/google-chrome/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/google-chrome/feed.xml" rel="self" type="application/rss+xml"/><item><title>Google Chrome Dawn Use-After-Free Vulnerability (CVE-2026-6310)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-dawn-uaf/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-dawn-uaf/</guid><description>A use-after-free vulnerability (CVE-2026-6310) in Google Chrome's Dawn component allows a remote attacker, having compromised the renderer process, to potentially execute a sandbox escape via a specially crafted HTML page.</description><content:encoded><![CDATA[<p>CVE-2026-6310 is a high-severity vulnerability affecting Google Chrome versions prior to 147.0.7727.101. The vulnerability lies within the Dawn component, a library used for interacting with the WebGPU API. An attacker who has already compromised the Chrome renderer process can exploit this use-after-free vulnerability to potentially escape the Chrome sandbox. Successful exploitation requires the attacker to craft a malicious HTML page that triggers the vulnerability in Dawn, enabling them to execute arbitrary code outside the confines of the renderer process and potentially gain control of the user&rsquo;s system. This poses a significant risk to users browsing untrusted websites.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTML page specifically designed to trigger the use-after-free vulnerability in the Dawn component of Google Chrome.</li>
<li>The victim visits the malicious HTML page via a compromised website, a phishing link, or other social engineering techniques.</li>
<li>The HTML page leverages the WebGPU API to interact with the Dawn component.</li>
<li>The malicious code manipulates memory in a way that leads to a use-after-free condition within Dawn.</li>
<li>The attacker exploits the use-after-free vulnerability to overwrite memory and gain control of program execution.</li>
<li>The attacker leverages the compromised renderer process to attempt a sandbox escape.</li>
<li>If successful, the attacker can execute arbitrary code outside the Chrome sandbox.</li>
<li>The attacker can then install malware, steal sensitive data, or perform other malicious actions on the victim&rsquo;s system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6310 allows an attacker to escape the Chrome sandbox, a security mechanism designed to isolate web content from the rest of the system. This could lead to arbitrary code execution on the victim&rsquo;s machine, potentially allowing the attacker to install malware, steal sensitive information, or perform other malicious activities. Given Chrome&rsquo;s widespread use, a successful exploit could impact a large number of users across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to version 147.0.7727.101 or later to patch CVE-2026-6310.</li>
<li>Implement a network detection rule to identify potentially malicious HTML pages that exploit WebGPU and trigger the use-after-free condition.</li>
<li>Monitor process creation events for unusual processes spawned by chrome.exe after the renderer process is compromised, as this may indicate a sandbox escape.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6310</category><category>use-after-free</category><category>sandbox escape</category><category>google chrome</category></item></channel></rss>