Impact
A use‑after‑free vulnerability in the Dawn rendering engine of Google Chrome prior to version 146.0.7680.165 can be triggered by a remote attacker via a crafted HTML page, potentially breaking the browser's sandbox and allowing arbitrary code execution with system privileges. The weakness corresponds to CWE‑416 (Use‑After‑Free) and CWE‑825 (Unchecked Return Value). This flaw jeopardises confidentiality, integrity, and availability by permitting control over the host system.
Affected Systems
The defect was found in Google Chrome versions older than 146.0.7680.165 on all mainstream operating systems, including Windows, macOS, Linux, and Chrome OS. Consequently, any user running an outdated Chrome build on these platforms remains exposed.
Risk and Exploitability
The CVSS base score of 8.8 indicates high severity, while the EPSS score of less than 1% implies a low probability of active exploitation today. The vulnerability is not listed in the CISA KEV catalog, suggesting no current widespread exploitation. Based on the description, it is inferred that the attack vector requires a victim to load a malicious web page in Chrome; no additional privileges or network access are mentioned. Though the exploit conditions are simple, the high impact warrants swift mitigation.
OpenCVE Enrichment
Debian DSA