Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0908: Use after free in Google Chrome

0
High
VulnerabilityCVE-2026-0908cvecve-2026-0908
Published: Tue Jan 20 2026 (01/20/2026, 04:14:17 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in ANGLE in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:24:57 UTC

Technical Analysis

CVE-2026-0908 is a use-after-free vulnerability identified in the ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome prior to version 144.0.7559.59. ANGLE is responsible for translating OpenGL ES calls to DirectX or Vulkan, enabling hardware-accelerated graphics rendering in Chrome. The vulnerability arises when the program accesses memory after it has been freed, leading to heap corruption. A remote attacker can exploit this by delivering a specially crafted HTML page that triggers the use-after-free condition, potentially allowing arbitrary code execution within the browser context. The vulnerability does not require any privileges or authentication but does require user interaction, such as visiting a malicious or compromised website. The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, and user interaction needed. While no public exploits are currently known, the flaw poses a significant risk due to Chrome's widespread usage and the critical nature of browser security. The vulnerability was publicly disclosed on January 20, 2026, and Google has released version 144.0.7559.59 to address the issue.

Potential Impact

The exploitation of CVE-2026-0908 can lead to severe consequences for organizations and individual users. Successful attacks may result in arbitrary code execution within the browser, enabling attackers to steal sensitive information, manipulate data, or disrupt services. Given Chrome's dominant market share globally, a large number of users and organizations are potentially exposed. The vulnerability can be leveraged to bypass browser security mechanisms, leading to further compromise of internal networks if used as an initial foothold. The requirement for user interaction limits mass exploitation but targeted attacks against high-value individuals or organizations remain a significant threat. The heap corruption caused by the use-after-free can also lead to browser crashes and denial of service, impacting availability. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future weaponization.

Mitigation Recommendations

Organizations should immediately update all Chrome installations to version 144.0.7559.59 or later to remediate the vulnerability. Beyond patching, deploying browser security best practices is critical: enable sandboxing and site isolation features to limit the impact of potential exploits; use Content Security Policy (CSP) headers to restrict the execution of untrusted scripts; employ web filtering solutions to block access to known malicious sites; and educate users about the risks of interacting with untrusted web content. Monitoring browser crash logs and unusual network activity can help detect exploitation attempts. For high-security environments, consider using hardened browser configurations or alternative browsers with different rendering engines until patches are applied. Regular vulnerability scanning and penetration testing should include checks for outdated browser versions to ensure compliance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-01-13T18:20:18.587Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696f02a94623b1157c1371df

Added to database: 1/20/2026, 4:20:57 AM

Last enriched: 2/27/2026, 8:24:57 AM

Last updated: 3/24/2026, 2:42:49 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses