Chrome 'Use-After-Free' Bug: Remote Code Execution Risk
A critical ‘use-after-free’ vulnerability, identified as CVE-2026-6317, has surfaced in Google Chrome. According to the National Vulnerability Database, this flaw impacts Chrome versions prior to 147.0.7727.101. This isn’t just a run-of-the-mill bug; it’s a high-severity issue that could allow a remote attacker to execute arbitrary code on a user’s system.
The mechanism behind this vulnerability is a crafted HTML page. An attacker could trick a user into visiting such a page, exploiting the ‘use-after-free’ condition within the Cast component of Chrome. The Common Weakness Enumeration (CWE) has categorized this as CWE-416, a classic memory corruption issue that often leads to serious consequences like arbitrary code execution. With a CVSS score of 8.8 (HIGH), this is definitely one to pay attention to.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 6 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-6317
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6317 | Use After Free | Google Chrome < 147.0.7727.101 |
| CVE-2026-6317 | RCE | Cast component in Google Chrome |
| CVE-2026-6317 | Code Injection | crafted HTML page |