Chrome's 'Use-After-Free' Bug: Remote Code Execution Risk
A high-severity ‘use-after-free’ vulnerability, identified as CVE-2026-6302, has been flagged in Google Chrome. According to the National Vulnerability Database, this flaw impacts versions prior to 147.0.7727.101, specifically within the browser’s video component. This isn’t just a minor bug; it’s a critical security bypass that could allow a remote attacker to execute arbitrary code.
The attack vector is insidious: all it takes is a specially crafted HTML page. Once rendered, the vulnerability could be exploited to run code within the sandbox, potentially leading to a full system compromise. The National Vulnerability Database has assigned this a CVSS score of 8.8 (HIGH), underscoring the severity and the urgent need for patching. This type of vulnerability, often categorized as CWE-416, is a common pitfall in memory management and a favorite among exploit developers for its reliability and impact.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 6 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-6302
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6302 | Use After Free | Google Chrome < 147.0.7727.101 |
| CVE-2026-6302 | RCE | Video component in Google Chrome |
| CVE-2026-6302 | Code Injection | crafted HTML page |