Impact
A use‑after‑free flaw in Chrome’s media handling on Android allows a remote attacker who has already compromised the renderer process to escape the renderer sandbox by serving a specially crafted HTML page. The vulnerability could enable the attacker to execute arbitrary code outside the sandbox, compromising the device and potentially other applications. The weakness is a classic use‑after‑free error.
Affected Systems
Google Chrome on Android, versions earlier than 147.0.7727.138. The flaw appears only in Android deployments of Chrome; no other product or platform variants are listed as affected.
Risk and Exploitability
The CVE severity is rated High. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires that an attacker can inject a crafted HTML page into a renderer that has already been compromised. Because the attacker must control the renderer or supply malicious content, the likelihood of a full exploitation chain is limited to users who run untrusted web content or have a prior compromise of the rendering process. Despite the limited vector, the impact of escaping the sandbox is severe, warranting prompt remediation.
OpenCVE Enrichment