Impact
A use‑after‑free vulnerability in the Cast component of Google Chrome allows an attacker on the same local network segment to send crafted network traffic that causes Chrome to execute arbitrary code inside its sandbox. This flaw can be exploited when the victim’s browser is running and receives malicious traffic, enabling the attacker to run code with the limited privileges of the Chrome sandbox.
Affected Systems
The affected product is Google Chrome. Versions prior to 147.0.7727.138 are vulnerable. The issue applies to the stable channel builds of Chrome before that release.
Risk and Exploitability
Exploitation requires a local network adversary capable of sending custom network packets to the target machine. The attacker does not need elevated or remote privileges; simply opening the vulnerable Chrome build to malicious traffic is sufficient. While the sandbox limits the impact to the browser’s process space, arbitrary code execution can still lead to credential theft, data exfiltration, or pivoting. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, but its high severity rating and local‑network attack surface suggest a potentially significant threat.
OpenCVE Enrichment