Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3061: Out of bounds read in Google Chrome

0
Unknown
VulnerabilityCVE-2026-3061cvecve-2026-3061
Published: Mon Feb 23 2026 (02/23/2026, 22:17:17 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Out of bounds read in Media in Google Chrome prior to 145.0.7632.116 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 02/23/2026, 22:46:53 UTC

Technical Analysis

CVE-2026-3061 is an out of bounds read vulnerability identified in the Media component of Google Chrome prior to version 145.0.7632.116. This vulnerability arises when Chrome processes specially crafted HTML pages containing malicious media content, leading to an out of bounds memory read. Such a flaw can allow an attacker to read memory locations beyond the intended buffer boundaries, potentially exposing sensitive information stored in memory, such as user data, cryptographic keys, or other confidential information. The vulnerability does not require authentication or user interaction beyond visiting a malicious webpage, making it remotely exploitable. Although no public exploits have been reported yet, the Chromium security team has classified this vulnerability as high severity, reflecting the significant risk it poses. The lack of a CVSS score means severity must be inferred from the nature of the vulnerability: out of bounds reads can lead to information disclosure, which compromises confidentiality but typically does not affect integrity or availability directly. The vulnerability affects all Chrome users running versions before 145.0.7632.116 across all supported platforms. The patch for this vulnerability is included in Chrome 145.0.7632.116, and users are strongly advised to update to this or later versions to mitigate the risk. Given Chrome's dominant market share in browsers worldwide, this vulnerability has a broad attack surface.

Potential Impact

The primary impact of CVE-2026-3061 is the potential unauthorized disclosure of sensitive information due to out of bounds memory reads. Attackers exploiting this vulnerability can remotely access memory contents that should be inaccessible, potentially exposing user credentials, session tokens, or other confidential data. This compromises the confidentiality of user data and can facilitate further attacks such as account takeover or targeted espionage. Since exploitation requires only that a user visits a malicious webpage, the attack vector is broad and can be leveraged in phishing campaigns or drive-by downloads. The vulnerability does not directly affect system integrity or availability but can be a stepping stone for more complex attacks. Organizations relying heavily on Chrome for web access, especially those handling sensitive or regulated data, face increased risk of data leakage. The widespread use of Chrome in enterprise, government, and consumer environments amplifies the potential impact globally.

Mitigation Recommendations

To mitigate CVE-2026-3061, organizations and users should immediately update Google Chrome to version 145.0.7632.116 or later, where the vulnerability is patched. Enterprises should enforce update policies to ensure all endpoints run the secure version. Network defenses such as web filtering and intrusion prevention systems can be configured to block access to known malicious sites or suspicious media content. Security teams should monitor for unusual browser behavior or memory access patterns indicative of exploitation attempts. User education on avoiding suspicious links and websites can reduce exposure. Additionally, employing browser isolation technologies can limit the impact of malicious web content. For high-security environments, consider restricting or monitoring the use of browser media features until patches are applied. Regular vulnerability scanning and threat intelligence updates will help detect emerging exploits related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-23T18:41:53.196Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699cd56ebe58cf853bd2d698

Added to database: 2/23/2026, 10:32:14 PM

Last enriched: 2/23/2026, 10:46:53 PM

Last updated: 2/24/2026, 5:31:11 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats