Critical Use-After-Free Bug Hits Chrome on Android
The National Vulnerability Database (NVD) recently published details on CVE-2026-6358, a critical use-after-free vulnerability affecting Google Chrome on Android. Specifically, versions prior to 147.0.7727.101 are susceptible. This isn’t just a garden-variety bug; we’re talking about a memory corruption issue that could let a remote attacker read memory out-of-bounds.
According to the NVD, the exploit vector involves a crafted HTML page. An attacker could lure a user to a malicious site, triggering the vulnerability within Chrome’s XR component. The Chromium security team has pegged this with a ‘Critical’ severity, and the CVSS v3.1 score of 8.8 (HIGH) backs that up. Use-after-free bugs (CWE-416) are particularly nasty because they can lead to arbitrary code execution or information disclosure, giving attackers a significant foothold.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 6 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-6358
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6358 | Use After Free | Google Chrome on Android prior to 147.0.7727.101 |
| CVE-2026-6358 | Memory Corruption | Out of bounds memory read in XR component |
| CVE-2026-6358 | RCE | Remote attacker via crafted HTML page |