Chrome Turbofan Bug: Remote Code Execution Threat
A high-severity type confusion vulnerability, tracked as CVE-2026-6301, has been identified in Google Chrome. According to the National Vulnerability Database, this flaw specifically impacts the Turbofan JavaScript engine in versions of Chrome prior to 147.0.7727.101. This isn’t some minor bug; we’re talking about a critical weakness that could allow a remote attacker to execute arbitrary code within the browser’s sandbox environment.
The attack vector is chillingly simple: a specially crafted HTML page. This means a user merely visiting a malicious website could trigger the exploit. The Chromium security team, as noted by the National Vulnerability Database, has rated this with ‘High’ severity, aligning with its CVSS score of 8.8. For those keeping score, a type confusion error (CWE-843) is a classic exploit primitive, often leading directly to memory corruption and, ultimately, arbitrary code execution.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 6 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-6301
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6301 | RCE | Google Chrome < 147.0.7727.101 |
| CVE-2026-6301 | Type Confusion | Turbofan component in Google Chrome |
| CVE-2026-6301 | Code Injection | crafted HTML page |