CVE-2020-16009
Summary
| CVE | CVE-2020-16009 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-11-03 03:15:00 UTC |
| Updated | 2023-11-07 03:18:00 UTC |
| Description | Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
Risk And Classification
EPSS: 0.843830000 probability, percentile 0.993170000 (date 2026-04-01)
CISA KEV: Listed on 2021-11-03; due 2022-05-03; ransomware use Unknown
Problem Types: CWE-787 | CWE-843
CISA Known Exploited Vulnerability
| Vendor | |
|---|---|
| Product | Chromium V8 |
| Name | Google Chromium V8 Type Confusion Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2020-16009 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cefsharp | Cefsharp | All | All | All | All |
| Operating System | Debian | Debian Linux | 10.0 | All | All | All |
| Operating System | Debian | Debian Linux | 10.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 32 | All | All | All |
| Operating System | Fedoraproject | Fedora | 33 | All | All | All |
| Operating System | Fedoraproject | Fedora | 32 | All | All | All |
| Operating System | Fedoraproject | Fedora | 33 | All | All | All |
| Application | Chrome | All | All | All | All | |
| Application | Chrome | All | All | All | All | |
| Application | Microsoft | Edge | All | All | All | All |
| Application | Microsoft | Edge | All | All | All | All |
| Application | Microsoft | Edge Chromium | All | All | All | All |
| Application | Microsoft | Edge Chromium | All | All | All | All |
| Application | Opensuse | Backports Sle | 15.0 | sp1 | All | All |
| Application | Opensuse | Backports Sle | 15.0 | sp2 | All | All |
| Application | Opensuse | Backports Sle | 15.0 | sp1 | All | All |
| Application | Opensuse | Backports Sle | 15.0 | sp2 | All | All |
| Operating System | Opensuse | Leap | 15.1 | All | All | All |
| Operating System | Opensuse | Leap | 15.2 | All | All | All |
| Operating System | Opensuse | Leap | 15.1 | All | All | All |
| Operating System | Opensuse | Leap | 15.2 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 1143772 - chromium - An open-source project to help move the web forward. - Monorail | MISC | crbug.com | Permissions Required |
| [SECURITY] Fedora 32 Update: chromium-87.0.4280.66-1.fc32 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [security-announce] openSUSE-SU-2020:1829-1: important: Security update | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| [security-announce] openSUSE-SU-2020:1831-1: important: Security update | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| [SECURITY] Fedora 33 Update: chromium-86.0.4240.183-1.fc33 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | Third Party Advisory |
| Debian -- Security Information -- DSA-4824-1 chromium | DEBIAN | www.debian.org | Third Party Advisory |
| Chrome V8 Turbofan Type Confusion ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| [SECURITY] Fedora 32 Update: chromium-87.0.4280.66-1.fc32 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | Third Party Advisory |
| Chromium, Google Chrome: Multiple vulnerabilities (GLSA 202011-12) — Gentoo security | GENTOO | security.gentoo.org | Third Party Advisory |
| Chrome Releases: Stable Channel Update for Desktop | MISC | chromereleases.googleblog.com | Release Notes, Vendor Advisory |
| [SECURITY] Fedora 33 Update: chromium-86.0.4240.183-1.fc33 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.