Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0908: Use after free in Google Chrome

0
High
VulnerabilityCVE-2026-0908cvecve-2026-0908
Published: Tue Jan 20 2026 (01/20/2026, 04:14:17 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2026-0908 is a high-severity use-after-free vulnerability in the ANGLE component of Google Chrome versions prior to 144. 0. 7559. 59. It allows remote attackers to exploit heap corruption by delivering a crafted HTML page, potentially leading to full compromise of confidentiality, integrity, and availability. Exploitation requires user interaction but no privileges or authentication. Although no known exploits are currently in the wild, the vulnerability’s high CVSS score (8. 8) indicates significant risk. European organizations relying on Chrome for web browsing are at risk, especially those in countries with high Chrome market share and critical infrastructure. Mitigation involves promptly updating Chrome to version 144.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:18:30 UTC

Technical Analysis

CVE-2026-0908 is a use-after-free vulnerability identified in the ANGLE (Almost Native Graphics Layer Engine) component of Google Chrome prior to version 144.0.7559.59. ANGLE is a graphics abstraction layer used by Chrome to translate OpenGL ES calls to DirectX or Vulkan, facilitating hardware-accelerated graphics rendering. The vulnerability arises when a previously freed memory object is accessed, leading to heap corruption. An attacker can exploit this flaw by crafting a malicious HTML page that triggers the use-after-free condition when rendered by the browser. This heap corruption can be leveraged to execute arbitrary code remotely, potentially allowing the attacker to take control of the affected system. The CVSS v3.1 base score is 8.8, indicating a high severity level, with attack vector being network-based, no privileges required, but user interaction is necessary (e.g., visiting a malicious webpage). The impact covers confidentiality, integrity, and availability, meaning sensitive data could be exposed or altered, and system stability compromised. Although no known exploits are currently reported in the wild, the vulnerability’s nature and severity make it a critical risk if weaponized. The vulnerability was publicly disclosed on January 20, 2026, and Google has released a patched Chrome version to address the issue. Due to Chrome’s extensive use across enterprises and consumers, this vulnerability poses a significant threat vector for remote code execution attacks.

Potential Impact

For European organizations, the impact of CVE-2026-0908 is substantial. Given Chrome’s dominant market share in Europe, many enterprises, government agencies, and critical infrastructure operators rely on it for daily operations. Successful exploitation could lead to remote code execution, enabling attackers to steal sensitive data, implant malware, or disrupt services. This is particularly concerning for sectors such as finance, healthcare, energy, and public administration, where data confidentiality and system availability are paramount. The requirement for user interaction (visiting a malicious webpage) means phishing or drive-by download attacks could be effective vectors. The vulnerability’s ability to compromise all three security pillars (confidentiality, integrity, availability) elevates the risk of data breaches, espionage, and operational disruption. Even though no active exploits are known, the high CVSS score and ease of exploitation without privileges make it a pressing threat. Organizations that delay patching may face increased risk from opportunistic attackers or future exploit development.

Mitigation Recommendations

1. Immediate update of all Google Chrome installations to version 144.0.7559.59 or later to apply the official patch addressing CVE-2026-0908. 2. Employ enterprise browser management tools to enforce automatic updates and prevent use of outdated versions. 3. Implement network-level protections such as web filtering and URL reputation services to block access to known malicious sites that could host exploit pages. 4. Enhance endpoint security with behavior-based detection capable of identifying anomalous memory corruption or code execution attempts. 5. Conduct user awareness training emphasizing the risks of clicking unknown links or visiting untrusted websites to reduce successful user interaction exploitation. 6. Utilize sandboxing and application isolation features to limit the impact of potential browser compromises. 7. Monitor security advisories and threat intelligence feeds for any emerging exploit reports related to this vulnerability. 8. For high-risk environments, consider deploying browser extensions or configurations that restrict JavaScript execution or disable unnecessary web features that could be exploited.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-01-13T18:20:18.587Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696f02a94623b1157c1371df

Added to database: 1/20/2026, 4:20:57 AM

Last enriched: 1/27/2026, 8:18:30 PM

Last updated: 2/6/2026, 2:55:50 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats