CVE-2026-7898

Google · Chrome

A Use-After-Free vulnerability in the Chromoting component of Google Chrome for Linux allows for potential arbitrary code execution.

Executive summary

A high-severity Use-After-Free vulnerability in Google Chrome's Chromoting component on Linux could allow a remote attacker to execute arbitrary code.

Vulnerability

This is a Use-After-Free memory corruption vulnerability located in the Chromoting feature. It requires user interaction, such as visiting a malicious site, to trigger the flaw and execute arbitrary code.

Business impact

Exploitation of this vulnerability could lead to system compromise on Linux workstations running the affected version of Chrome. With a CVSS score of 8.8, this vulnerability represents a significant risk to organizational assets, as successful exploitation could provide an attacker with a foothold within the corporate network.

Remediation

Immediate Action: Update Google Chrome on all Linux systems to version 148 or higher.

Proactive Monitoring: Audit browser usage logs and maintain active EDR monitoring on Linux endpoints to detect anomalous process behavior.

Compensating Controls: Implement strict network egress filtering to prevent compromised browsers from communicating with known malicious command-and-control infrastructure.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The severity of this flaw necessitates an immediate update cycle for all Linux-based Chrome environments. Failure to patch may expose workstations to arbitrary code execution, undermining the overall security posture of the affected systems.