
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-6425 is a security vulnerability discovered in Google Chrome versions prior to 80.0.3987.149, reported by Sergei Glazunov of Google Project Zero on December 6, 2019. The vulnerability involves insufficient policy enforcement in Chrome extensions that allowed an attacker who convinced a user to install a malicious extension to bypass site isolation via a crafted Chrome Extension (Chrome Release, NVD).
The vulnerability is classified as a policy enforcement error in Chrome's extension system. It has been assigned a CVSS v3.1 Base Score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N. The vulnerability is related to improper input validation (CWE-20) and specifically affects the extension policy enforcement mechanism in Chrome (NVD).
When successfully exploited, this vulnerability allows an attacker to bypass Chrome's site isolation feature through a malicious extension. This could potentially lead to unauthorized access to data that should be protected by site isolation, compromising the confidentiality and integrity of user data (NVD).
The vulnerability was patched in Chrome version 80.0.3987.149. Users and organizations are advised to upgrade to this version or later. Multiple Linux distributions including Debian, Fedora, and openSUSE have also released security updates to address this vulnerability (Debian Advisory, Gentoo Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."