CVE-2026-8574
Google · Chrome
A use-after-free vulnerability in the Core component of Google Chrome on Windows allows for potential arbitrary code execution.
Executive summary
A critical use-after-free vulnerability in Google Chrome on Windows poses a significant risk of arbitrary code execution and system compromise.
Vulnerability
This is a use-after-free vulnerability located within the Core component of the browser. The flaw can be triggered by an unauthenticated remote attacker through a crafted web page, leading to memory corruption.
Business impact
The exploitation of this vulnerability could allow a remote attacker to execute arbitrary code within the context of the user's browser session. With a CVSS score of 8.3, this high-severity flaw threatens data confidentiality and integrity, potentially leading to unauthorized access to sensitive user information or full system compromise.
Remediation
Immediate Action: Update all installations of Google Chrome on Windows to version 148 or later immediately.
Proactive Monitoring: Monitor endpoint process logs for abnormal child process spawning initiated by the browser.
Compensating Controls: Ensure that browser-based sandboxing features are enabled and utilize endpoint security solutions to detect anomalous memory access patterns.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the severity of memory-based vulnerabilities in browser environments, organizations must prioritize patching. Deploy the latest version of Chrome across the enterprise to mitigate the risk of remote code execution.