Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-mcug-5ay7-cqdz
Vulnerability ID VCID-mcug-5ay7-cqdz
Aliases CVE-2020-16017
GHSA-gvqv-779r-4jgp
Summary Use after free in CefSharp CVE-2020-16017: Use after free in site isolation - https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017 Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild. There is currently little to no public information on the issue other than it has been flagged as `High` severity.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16017.json
epss 0.21415 https://api.first.org/data/v1/epss?cve=CVE-2020-16017
epss 0.21415 https://api.first.org/data/v1/epss?cve=CVE-2020-16017
epss 0.21415 https://api.first.org/data/v1/epss?cve=CVE-2020-16017
epss 0.21415 https://api.first.org/data/v1/epss?cve=CVE-2020-16017
epss 0.21415 https://api.first.org/data/v1/epss?cve=CVE-2020-16017
epss 0.21415 https://api.first.org/data/v1/epss?cve=CVE-2020-16017
epss 0.21415 https://api.first.org/data/v1/epss?cve=CVE-2020-16017
epss 0.21415 https://api.first.org/data/v1/epss?cve=CVE-2020-16017
epss 0.21415 https://api.first.org/data/v1/epss?cve=CVE-2020-16017
cvssv3.1 9.6 https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
generic_textual HIGH https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
ssvc Attend https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
cvssv3.1 9.6 https://crbug.com/1146709
generic_textual HIGH https://crbug.com/1146709
ssvc Attend https://crbug.com/1146709
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-gvqv-779r-4jgp
cvssv3.1_qr HIGH https://github.com/cefsharp/CefSharp/security/advisories/GHSA-gvqv-779r-4jgp
generic_textual HIGH https://github.com/cefsharp/CefSharp/security/advisories/GHSA-gvqv-779r-4jgp
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2020-16017
archlinux High https://security.archlinux.org/AVG-1981
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16017.json
https://api.first.org/data/v1/epss?cve=CVE-2020-16017
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
https://crbug.com/1146709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
https://github.com/cefsharp/CefSharp/security/advisories/GHSA-gvqv-779r-4jgp
https://nvd.nist.gov/vuln/detail/CVE-2020-16017
1897207 https://bugzilla.redhat.com/show_bug.cgi?id=1897207
AVG-1981 https://security.archlinux.org/AVG-1981
GHSA-gvqv-779r-4jgp https://github.com/advisories/GHSA-gvqv-779r-4jgp
GLSA-202011-16 https://security.gentoo.org/glsa/202011-16
RHSA-2020:5165 https://access.redhat.com/errata/RHSA-2020:5165
Data source KEV
Date added Nov. 3, 2021
Description Google Chrome contains a use-after-free vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page.
Required action Apply updates per vendor instructions.
Due date May 3, 2022
Note
https://nvd.nist.gov/vuln/detail/CVE-2020-16017
Ransomware campaign use Unknown
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16017.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:19:29Z/ Found at https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Found at https://crbug.com/1146709
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T14:19:29Z/ Found at https://crbug.com/1146709
Exploit Prediction Scoring System (EPSS)
Percentile 0.95669
EPSS Score 0.21415
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:00:16.445409+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/11/GHSA-gvqv-779r-4jgp/GHSA-gvqv-779r-4jgp.json 38.0.0