Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3062: Out of bounds read and write in Google Chrome

0
Unknown
VulnerabilityCVE-2026-3062cvecve-2026-3062
Published: Mon Feb 23 2026 (02/23/2026, 22:17:18 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Out of bounds read and write in Tint in Google Chrome on Mac prior to 145.0.7632.116 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

AILast updated: 02/23/2026, 22:46:41 UTC

Technical Analysis

CVE-2026-3062 is a security vulnerability identified in the Tint component of Google Chrome on macOS platforms, affecting versions prior to 145.0.7632.116. Tint is involved in rendering processes, and the flaw allows an out-of-bounds read and write condition. This means that when processing a specially crafted HTML page, Chrome may access memory locations outside the allocated buffer boundaries. Such out-of-bounds memory access can lead to several critical consequences including information leakage, corruption of memory, and potentially arbitrary code execution if exploited successfully. The vulnerability is remotely exploitable by an attacker who can lure a user into visiting a malicious webpage, without requiring any prior authentication. Although no exploits have been observed in the wild yet, the Chromium security team has classified the severity as high, indicating a significant risk. The lack of a CVSS score means severity must be inferred from the nature of the flaw, its impact on confidentiality, integrity, and availability, and the ease of exploitation. The vulnerability affects only the macOS version of Chrome, limiting the scope but still posing a substantial risk given Chrome's widespread use. The patch for this vulnerability is included in Chrome version 145.0.7632.116, and users running earlier versions are vulnerable. The flaw underscores the importance of timely updates and vigilance against crafted web content that can exploit browser rendering engines.

Potential Impact

The impact of CVE-2026-3062 is significant for organizations and individuals using Google Chrome on macOS. Successful exploitation can lead to unauthorized memory access, which may result in information disclosure of sensitive data residing in memory. More critically, memory corruption from out-of-bounds writes can enable attackers to execute arbitrary code within the context of the browser process, potentially leading to full system compromise if combined with other vulnerabilities or sandbox escapes. This can facilitate further attacks such as malware installation, data theft, or lateral movement within corporate networks. Since Chrome is a widely used browser, the vulnerability poses a broad risk to enterprises, government agencies, and end users. The requirement for user interaction (visiting a malicious webpage) means phishing or drive-by download attacks are likely vectors. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly once the vulnerability is public. Organizations with macOS endpoints, especially those in sensitive sectors like finance, healthcare, and critical infrastructure, face elevated risk. The vulnerability could also be leveraged in targeted attacks against high-value individuals or entities.

Mitigation Recommendations

To mitigate CVE-2026-3062, organizations and users should immediately update Google Chrome on macOS to version 145.0.7632.116 or later, where the vulnerability is patched. Beyond patching, organizations should implement browser security best practices such as enabling sandboxing features, restricting browser extensions to trusted sources, and employing web content filtering to block access to known malicious sites. Network-level protections like DNS filtering and intrusion prevention systems can help reduce exposure to malicious web content. Endpoint detection and response (EDR) solutions should be tuned to detect anomalous browser behavior indicative of exploitation attempts. User education is critical to reduce the risk of social engineering attacks that lure users to crafted malicious pages. For high-security environments, consider deploying browser isolation technologies that execute web content in remote containers, preventing direct access to endpoint memory. Regular vulnerability scanning and asset inventory to identify vulnerable Chrome versions on macOS devices will help prioritize remediation efforts. Finally, monitoring threat intelligence feeds for emerging exploits related to this CVE will enable proactive defense adjustments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-02-23T18:41:53.536Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699cd56ebe58cf853bd2d69c

Added to database: 2/23/2026, 10:32:14 PM

Last enriched: 2/23/2026, 10:46:41 PM

Last updated: 2/24/2026, 6:05:29 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats