Impact
A use‑after‑free bug was found in Dawn, the graphics engine used by Google Chrome. The flaw allows an attacker who has already compromised the renderer process to free an object and then reference it after it has been deallocated. This can let the attacker run code outside the renderer sandbox, potentially gaining broader system access. The weakness is classified as CWE‑416 and is rated high severity by Chromium.
Affected Systems
The vulnerability affects Google Chrome up to version 147.0.7727.100. Any installation of Chrome prior to 147.0.7727.101 is potentially exposed. This includes desktop builds of Chrome that rely on the Dawn engine for rendering.
Risk and Exploitability
Chromium labels the issue as high security severity, reflected by a CVSS score of 8.3, and the EPSS score is not available; the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a remote attacker to have already compromised the renderer process, for example via a malicious website or by delivering crafted HTML content that is rendered. While the attacker must first take the renderer, once achieved the use‑after‑free can be leveraged to escape the sandbox and execute code with the privileges of the browser process. The limited prerequisite reduces the overall likelihood compared to pure remote code execution vulnerabilities, but the impact of a successful exploit is significant.
OpenCVE Enrichment