Chrome Android Bug: High-Severity Use-After-Free Exploit
The National Vulnerability Database (NVD) has documented a high-severity vulnerability, CVE-2026-6315, impacting Google Chrome on Android. This flaw, categorized as a use-after-free bug (CWE-416) within the Permissions component, could allow a remote attacker to execute arbitrary code. The vulnerability existed in Chrome versions prior to 147.0.7727.101.
For an attacker to successfully exploit this, they would need to craft a malicious HTML page and then convince a user to engage in specific UI gestures. Once triggered, the use-after-free condition grants the attacker the ability to run their own code on the affected device. Chromium’s security team has rated this with a ‘High’ severity, aligning with its CVSS score of 8.8. This kind of bug is a classic memory corruption issue that often leads to reliable remote code execution, making it a serious threat.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 6 SIEM formats5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-6315
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6315 | Use After Free | Google Chrome on Android prior to 147.0.7727.101 |
| CVE-2026-6315 | RCE | execute arbitrary code via a crafted HTML page |
| CVE-2026-6315 | Memory Corruption | Use after free in Permissions |