Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1861: Heap buffer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-1861cvecve-2026-1861
Published: Tue Feb 03 2026 (02/03/2026, 20:56:47 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:50:04 UTC

Technical Analysis

CVE-2026-1861 is a heap buffer overflow vulnerability identified in the libvpx library used by Google Chrome prior to version 144.0.7559.132. Libvpx is an open-source VP8/VP9 video codec library integrated into Chrome for video decoding tasks. The vulnerability arises from improper handling of memory buffers during video processing, allowing an attacker to craft a malicious HTML page that triggers heap corruption. This corruption can lead to arbitrary code execution within the context of the browser process. The vulnerability is remotely exploitable without requiring any privileges or authentication, but it does require user interaction, such as visiting a specially crafted webpage. The CVSS v3.1 base score of 8.8 reflects high impact on confidentiality, integrity, and availability, with an attack vector of network, low attack complexity, no privileges required, and user interaction needed. Although no exploits have been observed in the wild yet, the potential for exploitation is significant given Chrome's widespread use and the critical nature of the flaw. The vulnerability affects all platforms running vulnerable Chrome versions, including Windows, macOS, Linux, and Chrome OS. The lack of publicly available patches at the time of disclosure underscores the urgency for organizations to monitor updates closely and apply fixes promptly once available.

Potential Impact

The heap buffer overflow in libvpx within Chrome can lead to arbitrary code execution, enabling attackers to compromise the confidentiality, integrity, and availability of affected systems. Successful exploitation could allow attackers to execute malicious code remotely, potentially installing malware, stealing sensitive information, or disrupting user operations. Given Chrome's dominant market share as a web browser globally, the scope of affected systems is vast, impacting enterprises, governments, and individual users alike. The requirement for user interaction (visiting a malicious webpage) lowers the barrier for exploitation but still necessitates social engineering or drive-by download scenarios. The vulnerability's presence in a core multimedia processing library increases the risk of exploitation through common web content, making it a critical threat vector. Organizations relying heavily on Chrome for business operations face risks of data breaches, espionage, and service disruptions if unpatched. The absence of known exploits in the wild currently provides a window for proactive defense, but the high severity demands immediate attention to prevent future attacks.

Mitigation Recommendations

Organizations should immediately verify their Chrome browser versions and prioritize upgrading to version 144.0.7559.132 or later once patches are released. Until patches are available, consider deploying browser security policies that restrict or sandbox video content processing, such as disabling or limiting VP8/VP9 codec usage where feasible. Employ network-level protections like web filtering and intrusion prevention systems to block access to suspicious or untrusted websites that could host malicious HTML content. Educate users about the risks of visiting untrusted websites and the importance of prompt browser updates. Utilize endpoint detection and response (EDR) tools to monitor for anomalous browser behavior indicative of exploitation attempts. For high-security environments, consider using browser isolation technologies to contain potential exploits. Maintain up-to-date threat intelligence feeds to detect emerging exploit attempts targeting this vulnerability. Finally, coordinate with IT and security teams to integrate vulnerability management workflows that ensure timely patch deployment and verification.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-03T20:25:08.273Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982655ef9fa50a62fe085f1

Added to database: 2/3/2026, 9:15:10 PM

Last enriched: 2/27/2026, 7:50:04 AM

Last updated: 3/24/2026, 1:36:41 AM

Views: 423

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses