Security News > 2020 > September > Chrome Sandbox Escape Vulnerability Earns Researchers $20,000
Two researchers have earned $20,000 from Google for reporting a sandbox escape vulnerability affecting the Chrome web browser.
The researchers who discovered the issue, Leecraso and Guang Gong of the 360 Alpha Lab at Chinese cybersecurity company Qihoo 360, told SecurityWeek that while the vulnerability affects Chrome on all platforms, they have only managed to trigger it on Android.
Leecraso explained that CVE-2020-6573 is a sandbox escape vulnerability that can be exploited in combination with a different security bug.
A remote code execution vulnerability in the Blink rendering engine or the V8 JavaScript engine may not have much value to an attacker if they cannot escape Chrome's sandbox.
An attacker could combine CVE-2020-6573 with such a vulnerability to execute arbitrary code in the browser renderer process, outside the sandbox.
News URL
Related news
- Google Chrome Adds V8 Sandbox - A New Defense Against Browser Attacks (source)
- Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability (source)
- Another Chrome Vulnerability (source)
- New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation (source)
- Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-09-21 | CVE-2020-6573 | Use After Free vulnerability in multiple products Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | 9.6 |