Two researchers have earned $20,000 from Google for reporting a sandbox escape vulnerability affecting the Chrome web browser.
The flaw, tracked as CVE-2020-6573, has been described by Google as a high-severity use-after-free bug affecting Chrome’s “video” component.
Google said this week that it patched the vulnerability with the release of a Chrome 85 update for Windows, Mac and Linux. However, the researchers who discovered the issue, Leecraso and Guang Gong of the 360 Alpha Lab at Chinese cybersecurity company Qihoo 360, told SecurityWeek that while the vulnerability affects Chrome on all platforms, they have only managed to trigger it on Android.
Leecraso explained that CVE-2020-6573 is a sandbox escape vulnerability that can be exploited in combination with a different security bug.
For example, a remote code execution vulnerability in the Blink rendering engine or the V8 JavaScript engine may not have much value to an attacker if they cannot escape Chrome’s sandbox. An attacker could combine CVE-2020-6573 with such a vulnerability to execute arbitrary code in the browser renderer process, outside the sandbox.
Leecraso told SecurityWeek that he believes the vulnerability is easy to find and exploit, but he is not aware of any malicious attacks exploiting it.
Google was informed about the vulnerability on August 14. The tech giant decided to pay out a $20,000 reward, which is not uncommon for Chrome sandbox escapes.
Leecraso and Guang Gong also informed Google recently of a critical Chrome vulnerability that was patched in version 84, but a reward has yet to be determined.
In addition to CVE-2020-6573, this Chrome 85 update patches a high-severity issue described as insufficient policy enforcement in the installer, for which CodeColorist of Ant-Financial LightYear Labs earned $10,000.
Three other high-severity vulnerabilities have been patched in this release, including two reported by Microsoft, but their rewards have yet to be determined.
Related: Google Patches More High-Value Chrome Sandbox Escape Vulnerabilities
Related: GitHub Shares Details on Six Chrome Vulnerabilities
Related: Google Awards $10,000 for Remote Code Execution Vulnerability in Chrome

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Intel Co-founder, Philanthropist Gordon Moore Dies at 94
- Google Leads $16 Million Investment in Dope.security
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
