CVE-2026-9112

Google · Chrome

A use-after-free vulnerability in the GPU component of Google Chrome on Windows could lead to memory corruption and potential arbitrary code execution.

Executive summary

A critical use-after-free flaw in the Google Chrome GPU component on Windows exposes users to potential system compromise through malicious web content.

Vulnerability

The vulnerability exists in the GPU process of the browser. An unauthenticated attacker can exploit this by directing a user to a specially crafted website, leading to memory corruption.

Business impact

The CVSS score of 8.8 highlights the severity of this memory corruption vulnerability. Exploitation allows an attacker to execute arbitrary code with the privileges of the browser process, potentially leading to unauthorized data exfiltration or malware deployment on the host system.

Remediation

Immediate Action: Upgrade Google Chrome on all Windows workstations to version 148 or higher immediately.

Proactive Monitoring: Review endpoint security logs for signs of suspicious browser-initiated processes or unexpected memory-related errors.

Compensating Controls: Utilize browser-based security policies or group policies to disable unnecessary hardware acceleration features if patching is delayed.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability carries a high risk profile due to the ubiquitous nature of the Chrome browser. IT administrators must enforce the update to version 148 across all Windows environments to prevent potential exploitation.