Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0899: Out of bounds memory access in Google Chrome

0
High
VulnerabilityCVE-2026-0899cvecve-2026-0899
Published: Tue Jan 20 2026 (01/20/2026, 04:14:13 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2026-0899 is a high-severity out-of-bounds memory access vulnerability in the V8 JavaScript engine used by Google Chrome versions prior to 144. 0. 7559. 59. This flaw allows a remote attacker to exploit object corruption by delivering a crafted HTML page, potentially leading to full compromise of confidentiality, integrity, and availability. Exploitation requires user interaction but no privileges or authentication. Although no known exploits are currently in the wild, the vulnerability's high CVSS score (8. 8) reflects its critical impact if weaponized. European organizations using vulnerable Chrome versions face risks of data breaches, system compromise, and service disruption. Mitigation involves promptly updating Chrome to version 144.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:17:53 UTC

Technical Analysis

CVE-2026-0899 is a vulnerability identified in the V8 JavaScript engine component of Google Chrome prior to version 144.0.7559.59. It involves an out-of-bounds memory access, categorized under CWE-125 (Out-of-bounds Read) and CWE-787 (Out-of-bounds Write), which can lead to object corruption. This memory corruption flaw can be triggered remotely by an attacker who crafts a malicious HTML page that, when loaded by a victim's browser, exploits the vulnerability to manipulate memory beyond its intended boundaries. The consequences of such exploitation include arbitrary code execution, allowing attackers to compromise the confidentiality, integrity, and availability of the affected system. The CVSS v3.1 base score of 8.8 indicates a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no exploits have been reported in the wild yet, the vulnerability's nature and impact make it a critical risk. The vulnerability was published on January 20, 2026, shortly after being reserved on January 13, 2026. No patch links were provided in the source data, but the fixed version is identified as 144.0.7559.59. This vulnerability underscores the importance of timely browser updates and vigilance against malicious web content.

Potential Impact

For European organizations, the impact of CVE-2026-0899 is significant due to the widespread use of Google Chrome as a primary web browser. Successful exploitation can lead to arbitrary code execution within the browser context, enabling attackers to steal sensitive data, deploy malware, or pivot within internal networks. This is particularly critical for sectors handling sensitive personal data (e.g., finance, healthcare, government) under strict regulations like GDPR. The vulnerability's ability to compromise confidentiality, integrity, and availability means that data breaches, service outages, and reputational damage are plausible outcomes. Additionally, since exploitation requires only user interaction (visiting a malicious webpage), phishing campaigns or drive-by downloads could be effective attack vectors. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score demands urgent patching to prevent future attacks. Organizations relying on Chrome for web applications or remote work environments are especially vulnerable to disruption or data compromise.

Mitigation Recommendations

1. Immediately update all Google Chrome installations to version 144.0.7559.59 or later, which contains the fix for CVE-2026-0899. 2. Enforce automated browser update policies across enterprise endpoints to minimize the window of exposure. 3. Implement web filtering solutions to block access to known malicious or suspicious websites that could host crafted HTML pages exploiting this vulnerability. 4. Educate users about the risks of interacting with unknown or suspicious links and the importance of reporting phishing attempts. 5. Employ endpoint detection and response (EDR) tools capable of detecting anomalous browser behavior indicative of exploitation attempts. 6. Monitor network traffic for unusual outbound connections or data exfiltration that could signal compromise following exploitation. 7. For high-risk environments, consider deploying browser isolation technologies to contain potential exploits. 8. Maintain an inventory of browser versions in use and conduct regular vulnerability assessments to ensure compliance with patching policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-01-13T18:20:15.455Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696f02a94623b1157c1371bb

Added to database: 1/20/2026, 4:20:57 AM

Last enriched: 1/27/2026, 8:17:53 PM

Last updated: 2/6/2026, 3:43:27 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats