CVE-2026-6358
Published: 15 April 2026
Description
Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Critical)
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely identification, reporting, and patching of critical flaws like this use-after-free vulnerability in Chrome XR, preventing exploitation.
Implements memory safeguards that protect against use-after-free vulnerabilities by preventing unauthorized disclosure, modification, or execution of out-of-bounds memory.
Requires vulnerability scanning to detect and remediate instances of vulnerable Chrome versions affected by CVE-2026-6358 prior to exploitation.
Security SummaryAI
CVE-2026-6358 is a use-after-free vulnerability (CWE-416) in the XR component of Google Chrome on Android versions prior to 147.0.7727.101. It enables a remote attacker to perform an out-of-bounds memory read through a crafted HTML page. The issue carries a Chromium security severity rating of Critical and a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability.
A remote attacker can exploit this vulnerability over the network with low complexity and no privileges required, though it necessitates user interaction such as visiting a malicious site. Successful exploitation allows arbitrary out-of-bounds memory reads, potentially leading to sensitive data exposure, code execution, or system compromise on affected Android devices running vulnerable Chrome versions.
Google's Chrome Releases blog announces a stable channel update addressing this issue, with the fix included in version 147.0.7727.101. Additional details are available in Chromium issue tracker entry 497724498. Users should update to the patched version to mitigate the risk.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a use-after-free in Chrome exploited via a crafted HTML page from a remote attacker, enabling drive-by compromise (T1189) and exploitation for client execution (T1203) through user interaction like visiting a malicious site.