Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2321: Use after free in Google Chrome

0
High
VulnerabilityCVE-2026-2321cvecve-2026-2321
Published: Wed Feb 11 2026 (02/11/2026, 18:08:05 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:48:26 UTC

Technical Analysis

CVE-2026-2321 is a use-after-free vulnerability found in the Ozone platform abstraction layer of Google Chrome prior to version 145.0.7632.45. The vulnerability arises when the browser mishandles memory during specific user interface gestures, leading to heap corruption. An attacker can exploit this flaw by crafting a malicious HTML page that, when visited by a user who performs certain UI interactions, triggers the use-after-free condition. This memory corruption can be leveraged to execute arbitrary code within the context of the browser process, potentially allowing full compromise of the affected system. The vulnerability does not require any privileges or authentication but does require user interaction, specifically engaging with the malicious UI elements. The CVSS v3.1 base score is 8.8, reflecting the network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. While no exploits have been reported in the wild, the nature of the vulnerability and Chrome's widespread use make it a critical patching priority. The lack of patch links in the provided data suggests users should update to Chrome 145.0.7632.45 or later, where the issue is resolved.

Potential Impact

The impact of CVE-2026-2321 is significant due to its potential to allow remote code execution within the browser context, leading to full compromise of user data confidentiality, integrity, and system availability. Attackers can exploit this vulnerability to execute arbitrary code, install malware, steal sensitive information, or pivot to other parts of the network. Given Chrome's dominant market share globally, a successful exploit could affect millions of users and organizations. Enterprises relying on Chrome for daily operations, especially those handling sensitive or classified information, face increased risk of data breaches and operational disruption. The requirement for user interaction slightly reduces the attack surface but does not eliminate risk, as social engineering or drive-by attacks can induce the necessary UI gestures. The absence of known exploits in the wild currently limits immediate threat but does not preclude future exploitation, especially as threat actors analyze the vulnerability post-disclosure.

Mitigation Recommendations

1. Immediate update to Google Chrome version 145.0.7632.45 or later, where the vulnerability is patched. 2. Implement enterprise-wide browser update policies to ensure timely deployment of security patches. 3. Educate users about the risks of interacting with untrusted web content and suspicious UI elements to reduce the likelihood of triggering the exploit. 4. Employ browser hardening techniques such as enabling site isolation, sandboxing, and strict content security policies to limit the impact of potential exploitation. 5. Monitor network traffic and endpoint behavior for anomalies indicative of exploitation attempts, including unusual browser crashes or memory corruption signs. 6. Use endpoint detection and response (EDR) tools to detect and respond to suspicious activities related to browser processes. 7. Consider restricting access to high-risk websites or implementing web filtering solutions to reduce exposure to malicious pages. 8. Maintain regular backups and incident response plans to mitigate damage in case of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-10T21:51:46.478Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698cce7b4b57a58fa1b3e334

Added to database: 2/11/2026, 6:46:19 PM

Last enriched: 2/27/2026, 8:48:26 AM

Last updated: 3/28/2026, 9:55:20 PM

Views: 257

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses