Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2314: Heap buffer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-2314cvecve-2026-2314
Published: Wed Feb 11 2026 (02/11/2026, 18:08:01 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 02/11/2026, 19:02:43 UTC

Technical Analysis

CVE-2026-2314 is a heap buffer overflow vulnerability identified in the Codecs component of Google Chrome before version 145.0.7632.45. The flaw arises from improper handling of memory buffers during codec processing, which can be triggered by a specially crafted HTML page containing malicious media content. When a user visits such a page, the vulnerability can cause heap corruption, potentially allowing an attacker to execute arbitrary code within the context of the browser process. The vulnerability is remotely exploitable without any privileges or authentication, but requires user interaction in the form of visiting a malicious or compromised website. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could lead to data theft, browser compromise, or denial of service. Although no active exploits have been reported, the nature of the vulnerability and Chrome's widespread use make it a critical risk. The vulnerability affects all platforms running vulnerable Chrome versions, including Windows, macOS, and Linux. The absence of known exploits suggests that attackers may still be developing or testing attack vectors, emphasizing the need for proactive patching. The vulnerability was publicly disclosed on February 11, 2026, with Google releasing a patched Chrome version 145.0.7632.45 to remediate the issue. The technical root cause lies in unsafe memory operations in the codec processing pipeline, a common source of security flaws in multimedia handling components.

Potential Impact

European organizations face significant risks from CVE-2026-2314 due to the widespread adoption of Google Chrome as a primary web browser. Exploitation could lead to unauthorized access to sensitive information, compromise of user credentials, and potential lateral movement within corporate networks if attackers gain code execution capabilities. Critical sectors such as finance, healthcare, government, and energy are particularly vulnerable given their reliance on secure web communications and the potential consequences of browser compromise. The vulnerability could also be leveraged to deploy malware or ransomware, disrupting business operations and causing financial losses. Given the remote and unauthenticated nature of the exploit, threat actors can target a broad range of users, increasing the attack surface. The requirement for user interaction means phishing or social engineering campaigns could be used to lure victims to malicious sites. The impact extends beyond individual users to enterprise environments where Chrome is used for accessing cloud services and internal web applications, potentially exposing sensitive corporate data and infrastructure.

Mitigation Recommendations

Organizations should immediately update all instances of Google Chrome to version 145.0.7632.45 or later to remediate the vulnerability. In addition to patching, deploying browser exploit mitigation technologies such as sandboxing, strict site isolation, and enabling Chrome’s built-in security features (e.g., Enhanced Safe Browsing) can reduce risk. Network-level protections like web filtering and blocking access to known malicious domains can help prevent users from reaching exploit-hosting sites. Security awareness training should emphasize the risks of clicking unknown links or visiting untrusted websites to reduce user interaction risk. Enterprises should also consider application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious activity resulting from exploitation attempts. Regular vulnerability scanning and monitoring for unusual browser behavior can aid in early detection. Finally, organizations should maintain an incident response plan that includes steps for browser compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-10T21:51:42.579Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698cce794b57a58fa1b3e2a5

Added to database: 2/11/2026, 6:46:17 PM

Last enriched: 2/11/2026, 7:02:43 PM

Last updated: 2/20/2026, 11:13:33 PM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats