CVE-2026-8587

Google · Chrome

A use-after-free vulnerability exists within the Extensions component of Google Chrome on macOS, potentially allowing for arbitrary code execution.

Executive summary

A high-severity use-after-free vulnerability in Google Chrome on macOS exposes users to potential remote code execution and system compromise.

Vulnerability

This is a use-after-free vulnerability located in the Extensions component of the browser. It typically requires a user to interact with malicious web content, which triggers the flaw without explicit authentication.

Business impact

Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code within the context of the browser, potentially leading to unauthorized system access or data exfiltration. With a CVSS score of 8.8, this flaw represents a significant risk to organizational endpoints, necessitating immediate remediation to prevent potential compromise of sensitive user information.

Remediation

Immediate Action: Update Google Chrome on all macOS systems to version 148 or later immediately.

Proactive Monitoring: Review endpoint security logs for anomalous browser behavior or unexpected process crashes that may indicate exploitation attempts.

Compensating Controls: Ensure that browser-based security policies are enforced and consider using endpoint protection platforms (EPP) to detect malicious memory patterns.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical nature of memory corruption vulnerabilities in widely used web browsers, organizations must prioritize the deployment of the latest Chrome updates. Failure to patch these vulnerabilities leaves endpoints susceptible to browser-based attacks that can bypass standard security perimeters.