Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2650: Heap buffer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-2650cvecve-2026-2650
Published: Wed Feb 18 2026 (02/18/2026, 21:39:04 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:49:32 UTC

Technical Analysis

CVE-2026-2650 is a heap buffer overflow vulnerability identified in the Media component of Google Chrome prior to version 145.0.7632.109. The vulnerability arises from improper handling of heap memory during media processing, which can be exploited by a remote attacker through a specially crafted HTML page. When a user visits such a page, the attacker can trigger heap corruption, potentially leading to arbitrary code execution within the context of the browser. The vulnerability does not require any privileges or authentication, but does require user interaction in the form of visiting a malicious or compromised website. The CVSS v3.1 base score is 8.8, reflecting high severity with network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the nature of the vulnerability and the widespread use of Chrome make it a critical issue. The flaw affects all Chrome installations prior to the patched version 145.0.7632.109, which is widely deployed across consumer and enterprise environments. The vulnerability is particularly dangerous because it targets the media processing subsystem, often a complex and less scrutinized area, increasing the risk of exploitation. The lack of publicly available patches or exploit code at the time of publication means organizations must rely on prompt updates once patches are released and employ defense-in-depth strategies to mitigate risk.

Potential Impact

The potential impact of CVE-2026-2650 is significant for organizations worldwide due to the ubiquity of Google Chrome as a primary web browser. Successful exploitation can lead to arbitrary code execution, allowing attackers to execute malicious payloads, steal sensitive information, manipulate data, or disrupt system availability. This can result in data breaches, loss of intellectual property, operational downtime, and compromise of user credentials or session tokens. Since the vulnerability requires only user interaction and no privileges, it can be exploited at scale via phishing campaigns or malicious websites, increasing the attack surface. Enterprises with high-value targets such as financial institutions, government agencies, and critical infrastructure operators face elevated risks. Additionally, the vulnerability could be leveraged as an initial access vector for broader network compromise. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once details are public. Organizations failing to patch promptly may experience severe security incidents.

Mitigation Recommendations

To mitigate CVE-2026-2650, organizations should immediately update all Google Chrome installations to version 145.0.7632.109 or later once the patch is available. Until patches are deployed, consider implementing network-level protections such as web filtering to block access to untrusted or suspicious websites that could host malicious HTML content. Employ endpoint protection solutions capable of detecting anomalous behavior related to media processing or heap corruption. Educate users about the risks of interacting with unknown or untrusted web content to reduce the likelihood of exploitation via social engineering. Enable browser security features like sandboxing, site isolation, and strict content security policies to limit the impact of potential exploits. Monitor security logs and network traffic for indicators of compromise or unusual activity associated with browser processes. For high-security environments, consider restricting browser usage or using hardened browser configurations until patches are applied. Regularly review and update incident response plans to address potential exploitation scenarios involving browser vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-18T00:23:54.800Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6996357e6aea4a407aec4451

Added to database: 2/18/2026, 9:56:14 PM

Last enriched: 2/27/2026, 8:49:32 AM

Last updated: 4/5/2026, 3:28:51 AM

Views: 354

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses