Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3536: Integer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-3536cvecve-2026-3536
Published: Wed Mar 04 2026 (03/04/2026, 19:24:27 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 19:17:32 UTC

Technical Analysis

CVE-2026-3536 is an integer overflow vulnerability identified in the ANGLE graphics engine component of Google Chrome prior to version 145.0.7632.159. ANGLE is responsible for translating OpenGL ES calls to DirectX or Vulkan, playing a critical role in rendering web graphics. The integer overflow occurs when processing certain crafted HTML content, leading to out-of-bounds memory access. This memory corruption can be exploited by a remote attacker to execute arbitrary code within the context of the browser or cause denial of service through crashes. The vulnerability requires no privileges and no authentication but does require user interaction, such as visiting a malicious webpage. The CVSS v3.1 base score is 8.8, reflecting high severity with network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the critical nature and ease of exploitation make this a significant threat. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound), a common source of memory corruption issues. Google has released a patched version 145.0.7632.159 to address this flaw, but no direct patch links are provided in the data. Organizations using affected Chrome versions should prioritize updating to mitigate risk.

Potential Impact

The impact of CVE-2026-3536 is substantial due to the potential for remote code execution, which could allow attackers to take full control of the victim's browser environment. This can lead to data theft, session hijacking, installation of malware, or pivoting to internal networks. The vulnerability compromises confidentiality by exposing sensitive information, integrity by allowing unauthorized code execution or data manipulation, and availability by enabling denial of service through crashes. Since Chrome is a widely used browser globally, the scope of affected systems is vast, including enterprise environments, government agencies, and individual users. The requirement for user interaction (visiting a malicious webpage) slightly limits automated exploitation but does not significantly reduce risk given common web browsing habits. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical severity score indicates attackers may develop exploits rapidly. Organizations failing to patch promptly face increased risk of targeted attacks and widespread exploitation.

Mitigation Recommendations

1. Immediately update Google Chrome to version 145.0.7632.159 or later to apply the official patch addressing the integer overflow in ANGLE. 2. Employ network security controls such as web filtering and intrusion prevention systems to block access to known malicious websites and suspicious HTML content. 3. Educate users about the risks of visiting untrusted websites and the importance of prompt browser updates. 4. Implement endpoint protection solutions capable of detecting anomalous browser behavior or exploitation attempts. 5. Use browser security features like sandboxing and strict content security policies to limit the impact of potential exploits. 6. Monitor security advisories and threat intelligence feeds for emerging exploit reports related to this vulnerability. 7. For high-risk environments, consider restricting browser usage or deploying hardened browser configurations until patches are fully deployed. 8. Conduct regular vulnerability assessments and penetration testing to verify the effectiveness of mitigation measures.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-04T18:18:27.120Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a88902d1a09e29cb6a2446

Added to database: 3/4/2026, 7:33:22 PM

Last enriched: 3/12/2026, 7:17:32 PM

Last updated: 4/19/2026, 10:52:02 AM

Views: 493

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses