CVE-2026-3909
Google · Chrome
Google Chrome versions prior to 146 contain an out-of-bounds write vulnerability in the Skia graphics engine, which is currently being exploited in the wild.
Executive summary
A high-severity out-of-bounds write in Google Chrome's Skia engine is under active exploitation, allowing attackers to execute arbitrary code via malicious web content.
Vulnerability
This vulnerability is an out-of-bounds write within the Skia component, which handles graphics rendering. An unauthenticated attacker can trigger this flaw by enticing a user to visit a specially crafted website, leading to memory corruption and potential remote code execution (RCE) within the browser's sandbox.
Business impact
As a CVSS 8.8 vulnerability included in the CISA KEV, the risk is immediate and verified. Successful exploitation can lead to the compromise of user workstations, theft of session cookies, and unauthorized access to corporate web applications. The active exploitation status elevates this from a theoretical risk to a confirmed threat.
Remediation
Immediate Action: Update Google Chrome to version 146 or later immediately across the entire enterprise to mitigate active threats.
Proactive Monitoring: Use endpoint detection and response (EDR) tools to look for suspicious child processes originating from Chrome or unusual memory allocation patterns.
Compensating Controls: Deploy web filtering to block access to known malicious domains and ensure browser sandboxing features are strictly enforced via Group Policy.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to confirmed active exploitation, this vulnerability must be treated with the highest priority. IT teams should automate the deployment of Chrome version 146 and verify that all endpoints have successfully updated. The 13-day window remaining for remediation emphasizes the urgency of this action.