Google patches critical vulnerability in Chrome: Key security update addresses active exploit threat

Mar 17, 2026 | Threat Intelligence Research

Critical Zero-Day Vulnerabilities in Google Chrome Prompt Emergency Update

Google has released an urgent update for Google Chrome, addressing two critical zero-day vulnerabilities tracked as CVE-2026-3909 and CVE-2026-3910, which are being actively exploited in the wild. This rapid response follows a similar zero-day patch earlier this year, emphasizing the ongoing challenges that browser developers face in safeguarding against sophisticated cyber threats.

CVE-2026-3909 is an out-of-bounds write vulnerability affecting the Skia Graphics Library, a core component that handles graphics rendering in Chrome. This flaw allows an attacker to deliver specially crafted graphical content, leading to memory corruption during the rendering phase. Exploitation could enable attackers to crash the browser, execute arbitrary code, or leverage further vulnerabilities for more severe attacks. Given that modern websites use extensive graphical rendering, the attack surface is significantly broadened, allowing embedded malicious payloads to originate from seemingly legitimate web content.

The second vulnerability, CVE-2026-3910, stems from improper implementation within the V8 JavaScript Engine, which executes JavaScript and WebAssembly code in Chrome. This flaw implies that attackers can manipulate memory or object handling through specially crafted JavaScript. The exploitation can be achieved simply by accessing a compromised webpage, making it particularly dangerous as users do not have to take any additional action beyond visiting a site.

Defensive Context
Organizations utilizing Google Chrome versions prior to 146.0.7680.75 for Windows and macOS, and 146.0.7680.76 for Linux, as well as Microsoft Edge versions prior to 144.0.3719.130, should prioritize these updates. User environments where browser security is crucial, such as corporate networks and institutions dealing with sensitive data, must urgently implement these patches. Users who primarily engage with well-known, secure websites may have a lower immediate risk.

Why This Matters
The effective exploitation of these vulnerabilities poses a significant risk, particularly for environments relying heavily on dynamic web content. Organizations that utilize web applications in their operations are exposed, especially if their users frequently visit multiple websites without strict browsing controls.

Defender Considerations
Immediate action includes updating Google Chrome and Microsoft Edge to the specified version or later. Because of the nature of these vulnerabilities, monitoring for suspicious activities related to web-based threats becomes essential. In addition, blocking access to untrusted websites may reduce exposure to these types of attacks.

Indicators of Compromise (IOCs)
Affected products include Google Chrome versions below 146.0.7680.75 (Windows and macOS) and 146.0.7680.76 (Linux), as well as Microsoft Edge versions below 144.0.3719.130.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles