Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2649: Integer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-2649cvecve-2026-2649
Published: Wed Feb 18 2026 (02/18/2026, 21:39:03 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:49:12 UTC

Technical Analysis

CVE-2026-2649 is an integer overflow vulnerability identified in the V8 JavaScript engine component of Google Chrome prior to version 145.0.7632.109. The vulnerability arises when the engine improperly handles integer arithmetic, leading to an overflow condition. This flaw can be exploited remotely by an attacker who crafts a malicious HTML page that, when rendered by the vulnerable Chrome browser, triggers heap corruption. Heap corruption can enable an attacker to execute arbitrary code within the context of the browser process, potentially allowing full compromise of the user's system or data. The vulnerability requires no prior authentication but does require user interaction, such as visiting or being redirected to a malicious webpage. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, and user interaction needed. Although no known exploits have been reported in the wild yet, the severity and nature of the flaw make it a critical patching priority. The vulnerability affects all platforms running the vulnerable Chrome versions, including Windows, macOS, Linux, and mobile platforms. The lack of publicly available patches at the time of disclosure suggests organizations must monitor for updates closely. The vulnerability is part of the broader category of memory corruption bugs common in complex browser engines, emphasizing the importance of secure coding and runtime protections.

Potential Impact

The potential impact of CVE-2026-2649 is significant for organizations worldwide. Successful exploitation can lead to arbitrary code execution within the browser context, enabling attackers to bypass security controls, steal sensitive information, install malware, or pivot within internal networks. The compromise of browser security can undermine user confidentiality and integrity, disrupt availability by crashing or destabilizing the browser, and facilitate further attacks such as ransomware or espionage. Given Chrome's dominant market share globally, a large number of users and organizations are exposed. Enterprises relying on Chrome for web applications, remote work, or cloud services are particularly at risk. The requirement for user interaction means phishing or drive-by download attacks could be vectors. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly once details are public. Failure to patch promptly could lead to widespread exploitation, data breaches, and operational disruptions.

Mitigation Recommendations

Organizations should immediately verify their Chrome browser versions and upgrade to 145.0.7632.109 or later once patches are available. Until patched, users should be advised to avoid visiting untrusted or suspicious websites and to exercise caution with links received via email or messaging platforms. Deploying browser security features such as sandboxing, site isolation, and strict content security policies can reduce exploitation risk. Network-level protections like web filtering and intrusion prevention systems should be configured to block access to known malicious domains. Endpoint detection and response (EDR) solutions should monitor for anomalous browser behavior indicative of exploitation attempts. Security teams should conduct user awareness training focused on phishing and social engineering risks. Organizations may consider temporarily restricting browser usage or employing alternative browsers in high-risk environments until patches are applied. Continuous monitoring for updates from Google and threat intelligence feeds is essential to respond promptly to emerging exploit activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-18T00:23:54.421Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6996357e6aea4a407aec444d

Added to database: 2/18/2026, 9:56:14 PM

Last enriched: 2/27/2026, 8:49:12 AM

Last updated: 4/5/2026, 1:11:46 AM

Views: 261

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses