CVE-2026-0908

Google · Google Multiple Products

A high-severity vulnerability has been identified in multiple Google products, including Google Chrome.

Executive summary

A high-severity vulnerability has been identified in multiple Google products, including Google Chrome. This flaw, a "Use after free" in the ANGLE graphics engine, could allow a remote attacker to execute arbitrary code on a user's system by tricking them into visiting a specially crafted webpage, potentially leading to a full system compromise.

Vulnerability

The vulnerability is a Use-After-Free condition within ANGLE (Almost Native Graphics Layer Engine), a component used by Chrome to translate OpenGL ES calls to native platform APIs like DirectX or Vulkan. An attacker can create a malicious webpage with specific WebGL content that causes the browser to incorrectly manage memory. By triggering a sequence of operations, the application can be forced to reference a pointer to a memory location that has already been deallocated (freed). The attacker can then manipulate this freed memory space to inject and execute their own malicious code in the context of the user's browser process.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could lead to a complete compromise of the affected user's workstation. The primary business impacts include the potential for theft of sensitive corporate data, installation of persistent malware such as ransomware or spyware, and the use of the compromised system as a pivot point to attack other internal network resources. Given the widespread use of Google Chrome in enterprise environments, a large number of endpoints are likely susceptible, posing a significant risk to organizational security and data integrity.

Remediation

Immediate Action: The immediate and most effective remediation is to apply the security updates provided by the vendor. Organizations should prioritize updating Google Chrome to version 144 or later on all corporate endpoints. Concurrently, security teams should monitor for any signs of exploitation attempts by reviewing endpoint detection and response (EDR) alerts and analyzing web proxy and DNS logs for connections to suspicious domains.

Proactive Monitoring: Security teams should configure monitoring systems to detect anomalies associated with browser exploitation. This includes looking for unusual child processes being spawned by chrome.exe, unexpected network connections from browser processes to unknown IP addresses, and alerts from endpoint security solutions indicating memory corruption or code injection attempts.

Compensating Controls: If immediate patching is not feasible, organizations can implement compensating controls to reduce risk. These include using web filtering to block access to untrusted or newly registered domains, employing browser isolation technology to execute web sessions in a sandboxed environment, and ensuring that endpoint security tools are configured for aggressive behavioral monitoring to detect post-exploitation activity.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.8) and the potential for remote code execution, this vulnerability presents a significant risk to the organization. Although there is no evidence of active exploitation at this time, the widespread deployment of the affected software necessitates immediate action. We strongly recommend that all instances of Google Chrome and other affected Google products are updated to the patched versions without delay. This remediation effort should be treated as a high priority to prevent potential system compromise and data breaches.