CVE-2026-8522

Google · Chrome

A use-after-free vulnerability in the Downloads component of Google Chrome on macOS allows for potential code execution.

Executive summary

A use-after-free vulnerability in the Downloads component of Chrome on macOS enables attackers to achieve code execution on the host machine.

Vulnerability

A use-after-free flaw in the browser's download management system can be triggered by an attacker, leading to memory corruption and potential code execution.

Business impact

This vulnerability can be leveraged to gain unauthorized access to the underlying macOS environment. With a CVSS score of 8.8, it is a high-severity threat that necessitates immediate patching for all macOS users.

Remediation

Immediate Action: Update Google Chrome on all macOS endpoints to the patched version.

Proactive Monitoring: Review macOS system logs for crashes associated with the Chrome browser process.

Compensating Controls: Use mobile device management (MDM) tools to enforce software update policies.

Exploitation status

Public Exploit Available: False

Analyst recommendation

macOS administrators must ensure that the Chrome browser is updated promptly. The ease with which these vulnerabilities can be weaponized in the wild makes rapid patching an essential security hygiene practice.