Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3544: Heap buffer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-3544cvecve-2026-3544
Published: Wed Mar 04 2026 (03/04/2026, 19:24:30 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2026-3544 is a heap buffer overflow vulnerability in the WebCodecs component of Google Chrome versions prior to 145. 0. 7632. 159. This flaw allows a remote attacker to trigger an out-of-bounds memory write by delivering a specially crafted HTML page. Exploitation does not require user authentication but does require user interaction to visit a malicious web page. While no known exploits are currently reported in the wild, the vulnerability is classified with high severity by Chromium security. The vulnerability could lead to arbitrary code execution, compromising confidentiality, integrity, and availability of the affected system. Organizations using vulnerable Chrome versions are at risk, especially those with high exposure to web-based threats. Immediate patching to version 145.

AI-Powered Analysis

AILast updated: 03/04/2026, 19:47:48 UTC

Technical Analysis

CVE-2026-3544 is a heap buffer overflow vulnerability identified in the WebCodecs API implementation within Google Chrome prior to version 145.0.7632.159. WebCodecs is a web platform API that enables efficient video and audio encoding and decoding directly in the browser. The vulnerability arises from improper bounds checking during processing of codec data, allowing a remote attacker to craft a malicious HTML page that triggers an out-of-bounds write in heap memory. This memory corruption can lead to arbitrary code execution within the context of the browser process. Since the flaw is remotely exploitable via web content, an attacker can exploit it by luring a user to a malicious or compromised website. The vulnerability does not require prior authentication but does require user interaction (visiting the malicious page). Although no exploits have been publicly reported yet, the Chromium security team has rated the severity as high due to the potential for remote code execution and the widespread use of Chrome. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. The vulnerability affects all platforms running the vulnerable Chrome versions, including Windows, macOS, Linux, and Chrome OS. The issue was publicly disclosed on March 4, 2026, and users are advised to update to Chrome 145.0.7632.159 or later where the flaw is patched. The absence of patch links in the provided data suggests users should rely on official Google Chrome update channels for remediation.

Potential Impact

The heap buffer overflow in WebCodecs can allow remote attackers to execute arbitrary code within the browser context, potentially leading to full system compromise depending on sandbox escape techniques. This threatens confidentiality by enabling data theft, integrity by allowing malicious code injection or modification, and availability by causing browser crashes or denial of service. Organizations relying heavily on Chrome for web access, especially those handling sensitive data or critical operations, face significant risk. Attackers could leverage this vulnerability to deploy malware, conduct espionage, or disrupt services. The ease of exploitation via crafted web content and the ubiquity of Chrome amplify the threat's scope. Without timely patching, enterprises, governments, and individual users remain vulnerable to targeted or mass exploitation campaigns. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

Organizations should prioritize updating Google Chrome to version 145.0.7632.159 or later immediately to remediate the vulnerability. Employ enterprise patch management systems to enforce timely browser updates across all endpoints. Implement web content filtering and URL reputation services to block access to suspicious or untrusted websites that could host exploit pages. Use browser security features such as site isolation, sandboxing, and strict content security policies to limit the impact of potential exploitation. Monitor network traffic and endpoint behavior for indicators of compromise related to heap corruption or unusual browser crashes. Educate users about the risks of visiting untrusted websites and encourage cautious browsing habits. Consider deploying endpoint detection and response (EDR) solutions capable of detecting exploitation attempts targeting browser vulnerabilities. Regularly review and audit browser extensions and plugins to minimize attack surface. Finally, maintain up-to-date backups and incident response plans to quickly recover from any successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-04T18:18:30.060Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a88902d1a09e29cb6a2466

Added to database: 3/4/2026, 7:33:22 PM

Last enriched: 3/4/2026, 7:47:48 PM

Last updated: 3/4/2026, 8:38:30 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses