Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3544: Heap buffer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-3544cvecve-2026-3544
Published: Wed Mar 04 2026 (03/04/2026, 19:24:30 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:52:36 UTC

Technical Analysis

CVE-2026-3544 is a heap buffer overflow vulnerability identified in the WebCodecs API of Google Chrome prior to version 145.0.7632.159. WebCodecs is a web platform API that enables efficient video and audio encoding and decoding, integral to multimedia processing in browsers. The vulnerability arises from improper bounds checking during memory operations, allowing a remote attacker to craft a malicious HTML page that triggers an out-of-bounds write on the heap. This memory corruption can lead to arbitrary code execution within the context of the browser process, potentially allowing attackers to bypass security mechanisms, execute malicious payloads, or cause denial of service. The flaw requires no privileges and no prior authentication but does require user interaction, such as visiting a malicious or compromised webpage. The CVSS v3.1 base score is 8.8, indicating high severity with network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the nature of the vulnerability and its integration in a widely used browser make it a critical patching priority. The vulnerability was publicly disclosed on March 4, 2026, and users are advised to upgrade to Chrome 145.0.7632.159 or later where the issue is resolved.

Potential Impact

The impact of CVE-2026-3544 is significant for organizations worldwide due to the widespread use of Google Chrome across desktops, laptops, and mobile devices. Successful exploitation can lead to arbitrary code execution within the browser context, enabling attackers to steal sensitive data, install malware, or pivot to internal networks. The vulnerability affects confidentiality by potentially exposing user data, integrity by allowing unauthorized code execution, and availability by causing browser crashes or denial of service. Given Chrome's dominant market share, the scope of affected systems is vast, including enterprise environments, government agencies, and individual users. Attackers could leverage this flaw in targeted phishing campaigns or drive-by downloads. The requirement for user interaction limits automated mass exploitation but does not eliminate risk, especially in environments with high user exposure to untrusted web content. Organizations relying on Chrome for critical operations must consider this vulnerability a high risk and act promptly to mitigate potential breaches or disruptions.

Mitigation Recommendations

To mitigate CVE-2026-3544, organizations should immediately update all instances of Google Chrome to version 145.0.7632.159 or later, where the vulnerability is patched. Beyond patching, implement network-level protections such as web filtering to block access to known malicious sites and employ endpoint security solutions capable of detecting anomalous browser behavior. Educate users about the risks of interacting with untrusted web content and phishing attempts to reduce the likelihood of triggering the exploit. Consider deploying browser sandboxing or application isolation technologies to limit the impact of potential exploitation. Regularly monitor security advisories from Google and threat intelligence sources for any emerging exploit activity. For high-security environments, use browser configurations that disable or restrict WebCodecs API usage if feasible, or employ alternative browsers until patches are applied. Maintain comprehensive logging and incident response plans to quickly identify and respond to any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-04T18:18:30.060Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a88902d1a09e29cb6a2466

Added to database: 3/4/2026, 7:33:22 PM

Last enriched: 3/11/2026, 7:52:36 PM

Last updated: 4/17/2026, 2:16:02 PM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses