cognitive cybersecurity intelligence

News and Analysis

Search

Critical Vulnerability in Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds

Critical Vulnerability in Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds

Security researcher Jofpin has disclosed “Brash,” a critical flaw in Google’s Blink rendering engine that enables attackers to crash Chromium-based browsers almost instantly.

Affecting billions of users worldwide, this architectural weakness exploits unchecked updates to the document.title API, overwhelming the browser’s main thread and triggering system-wide denial of service without sophisticated tools or privileges.

The vulnerability stems from Blink’s lack of rate limiting on title changes, allowing malicious JavaScript to flood the DOM with millions of mutations per second.

As detailed in Jofpin’s proof-of-concept on GitHub, the attack unfolds in three phases: pre-generating high-entropy strings to avoid CPU overhead, injecting bursts of up to 24 million updates, and saturating the UI thread until collapse.

Browsers freeze within 15 to 60 seconds, spiking CPU usage to extremes that degrade overall system performance and halt concurrent processes.

Tested versions up to Chromium 143.0.7483.0 remain vulnerable, including Chrome, Edge, Opera, Brave, and Vivaldi on desktop, Android, and embedded devices.

Widespread Impact On Chromium Ecosystem

Brash’s reach is staggering, potentially exposing over 3 billion internet users to disruption since Chromium powers the majority of browsers.

On macOS, Windows, and Linux, Chrome crashes in 15-30 seconds under extreme settings, while slower variants like Brave take up to two minutes.

BrowserCrash TimeChrome15-30 secondsEdge15-25 secondsVivaldi15-30 secondsArc Browser15-30 secondsDia Browser15-30 secondsOpera~60 secondsPerplexity Comet15-35 secondsChatGPT Atlas15-60 secondsBrave30-125 seconds

Non-Chromium browsers escape unscathed: Firefox’s Gecko engine and Safari’s WebKit prove immune, as does iOS’s enforced WebKit policy, which bars native Chromium apps.

The exploit’s simplicity amplifies its threat. A live demo at brash.run simulates the attack invisibly, while local PoCs let users tweak intensity moderate for observation, extreme for rapid failure.

Code snippets enable easy integration, with options for delayed or scheduled triggers, turning benign pages into timed bombs.

Attackers could weaponize Brash in devastating ways. Time-delayed payloads lurk in phishing links, activating during high-stakes moments like stock trades or meetings, evading quick scans.

In AI-driven enterprises, it poisons headless browsers used for web scraping, paralyzing automated trading or compliance checks.

More alarmingly, scenarios envision life-threatening chaos: a surgeon’s web-assisted procedure derailed mid-operation, or a flash crash on Wall Street as traders’ terminals fail en masse during market open.

Banking fraud teams, too, face paralysis, allowing millions in unchecked transactions during peak volumes like Black Friday.

Jofpin emphasizes this as a design oversight, not a mere bug, urging Chromium developers to implement throttling. As the exploit remains operational until patched, users should exercise caution with untrusted sites.

Google has yet to respond publicly, but the disclosure highlights the need for robust safeguards in core web tech.

In an era of browser-dependent operations from finance to healthcare, such flaws underscore the web’s precarious balance between openness and security.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Critical Vulnerability in Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds appeared first on Cyber Security News.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

Supply Chain Attacks Surge in March 2026

Supply Chain Attacks Surge in March 2026

IntroductionThere was a significant increase in software supply chain attacks in March 2026. There were five major software supply-chain attacks that occurred including the Axios

Supply Chain Attacks Surge in March 2026

How to protect your data with Agentic AI

How Secure is Your Organization’s Approach to Non-Human Identities? Have you ever considered the scale of machine identities within your organization? With the expansive growth