CVE-2026-0899

Google · Google Multiple Products

A high-severity vulnerability has been identified in the V8 JavaScript engine used by Google Chrome and other products.

Executive summary

A high-severity vulnerability has been identified in the V8 JavaScript engine used by Google Chrome and other products. This flaw, an out-of-bounds memory access, can be exploited by an attacker who tricks a user into visiting a malicious website. Successful exploitation could allow the attacker to execute arbitrary code on the user's system, potentially leading to data theft, malware installation, or full system compromise.

Vulnerability

This vulnerability is an out-of-bounds memory access flaw within the V8 JavaScript engine. An attacker can exploit this by crafting a malicious web page with specific JavaScript code that, when processed by a vulnerable browser, causes the V8 engine to read or write data outside of its intended memory buffer. This memory corruption can be leveraged by the attacker to bypass security mechanisms and achieve arbitrary code execution within the context of the browser's sandboxed process. A sophisticated attacker could potentially chain this with a sandbox escape vulnerability to gain full control over the underlying operating system.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation could lead to the compromise of employee workstations, resulting in the theft of sensitive corporate data, intellectual property, and user credentials. An attacker could also use this access to install persistent malware, such as ransomware or spyware, leading to severe operational disruption and financial loss. A compromised endpoint could further serve as a beachhead for lateral movement within the corporate network, escalating the incident's impact.

Remediation

Immediate Action: Immediately apply security updates provided by Google to upgrade all instances of Google Chrome to version 144 or later. After patching is complete, monitor systems for any signs of post-patch exploitation attempts by reviewing endpoint detection and response (EDR) alerts and access logs for unusual activity originating from browser processes.

Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes looking for suspicious child processes spawned by browser processes (e.g., chrome.exe launching powershell.exe), monitoring for network traffic from browsers to unknown or malicious domains, and configuring EDR solutions to detect and alert on memory corruption or code injection techniques.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. These include using web filtering solutions to block access to uncategorized or known malicious websites, ensuring endpoint security solutions are fully updated with the latest behavioral detection rules, and enforcing the principle of least privilege to limit the post-exploitation capabilities of an attacker.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the potential for remote code execution, this vulnerability requires immediate attention. We strongly recommend that all vulnerable instances of Google Chrome and other affected products be patched on a priority basis. Although this CVE is not currently listed on the CISA KEV list, the severity of the flaw and the ubiquitous nature of web browsers as an attack vector make proactive remediation critical to safeguarding the organization's assets and infrastructure.