CVE-2026-2441
Google · Chrome
Google Chrome is vulnerable to a "Use After Free" condition in its CSS engine, which could allow a remote attacker to execute arbitrary code via a crafted webpage.
Executive summary
Google Chrome versions prior to 145 are vulnerable to a high-severity Use After Free flaw that could lead to remote code execution and browser compromise.
Vulnerability
This vulnerability is a memory corruption issue (Use After Free) within the CSS component of the browser. An unauthenticated remote attacker can exploit this by enticing a user to visit a specially crafted website, leading to a crash or arbitrary code execution.
Business impact
Exploitation of this flaw can lead to the compromise of the user's workstation, allowing for the theft of browser-stored credentials, session hijacking, or the installation of further malware. Given Chrome's ubiquity, this poses a significant risk to corporate endpoint security. The CVSS score of 8.8 reflects the high severity of remote code execution.
Remediation
Immediate Action: Update Google Chrome to version 145 or later across all endpoints immediately.
Proactive Monitoring: Utilize endpoint detection and response (EDR) tools to monitor for unusual browser crashes or suspicious child processes spawned by Chrome.
Compensating Controls: Implement web filtering to prevent users from accessing known malicious or untrusted websites that might host exploit code.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Browser updates are a critical component of endpoint hygiene. Administrators should ensure that auto-update mechanisms are functioning correctly and that all systems are running at least version 145 to mitigate this risk.