CVE-2026-7341
Google · Chrome
A use-after-free vulnerability in the WebRTC component of Google Chrome could allow an unauthenticated attacker to trigger memory corruption.
Executive summary
A critical use-after-free vulnerability in Google Chrome's WebRTC component could lead to arbitrary code execution.
Vulnerability
This is a use-after-free memory management error in the WebRTC engine. An unauthenticated attacker can exploit this by enticing a user to navigate to a malicious website.
Business impact
With a CVSS score of 8.8, this vulnerability poses a high threat to business operations. Exploitation can lead to unauthorized code execution, enabling attackers to bypass security controls and access sensitive information stored on the host system.
Remediation
Immediate Action: Update all installations of Google Chrome to version 147 or later as soon as the patch is available.
Proactive Monitoring: Review web proxy logs and browser activity logs for indicators of malicious redirects or unusual traffic patterns.
Compensating Controls: Deploy Web Application Firewalls (WAF) or secure web gateways to filter out known malicious payloads targeting browser vulnerabilities.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Browser-based vulnerabilities that allow for remote code execution are critical priorities. Organizations should ensure that the latest stable channel release of Chrome is enforced across the enterprise to mitigate this high-severity risk.