Security restrictions bypass in Google Chrome - CVE-2018-6082
Published: April 5, 2018 / Updated: June 11, 2021
Vulnerability identifier: #VU11586
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-6082
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Google
Affected software:
Google Chrome
Google Chrome
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to circumvention of port blocking. A remote attacker can bypass security restrictions.
The weakness exists due to circumvention of port blocking. A remote attacker can bypass security restrictions.
How to mitigate CVE-2018-6082
Update to version 65.0.3325.146.