Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3922: Use after free in Google Chrome

0
High
VulnerabilityCVE-2026-3922cvecve-2026-3922
Published: Wed Mar 11 2026 (03/11/2026, 22:04:06 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

CVE-2026-3922 is a high-severity use-after-free vulnerability in the MediaStream component of Google Chrome versions prior to 146. 0. 7680. 71. It allows a remote attacker to trigger heap corruption by crafting a malicious HTML page, potentially leading to arbitrary code execution. Exploitation requires user interaction, such as visiting a malicious website, but no privileges or prior authentication are needed. The vulnerability impacts confidentiality, integrity, and availability of affected systems. Although no known exploits are currently reported in the wild, the high CVSS score of 8. 8 indicates significant risk. Organizations using vulnerable Chrome versions should update immediately to the patched release.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:49:02 UTC

Technical Analysis

CVE-2026-3922 is a use-after-free vulnerability identified in the MediaStream component of Google Chrome before version 146.0.7680.71. Use-after-free bugs occur when a program continues to use memory after it has been freed, leading to undefined behavior such as heap corruption. In this case, a remote attacker can exploit this flaw by delivering a crafted HTML page that triggers the vulnerability when rendered by the browser. The flaw resides in the handling of MediaStream objects, which are used for real-time media capture and processing in web applications. Successful exploitation can allow an attacker to execute arbitrary code within the context of the browser process, compromising the confidentiality, integrity, and availability of the user's system. The vulnerability requires no privileges and no prior authentication but does require user interaction, such as visiting a malicious or compromised website. The CVSS v3.1 base score is 8.8, reflecting high impact and ease of exploitation. Although no exploits are currently known in the wild, the severity and nature of the vulnerability make it a critical patching priority. Google has released version 146.0.7680.71 to address this issue, and users are strongly advised to upgrade. The vulnerability affects all platforms running the vulnerable Chrome versions, including Windows, macOS, Linux, and mobile platforms where Chrome is deployed. Given Chrome's dominant market share worldwide, the scope of affected systems is extensive.

Potential Impact

The impact of CVE-2026-3922 is significant for organizations and individual users relying on Google Chrome for web browsing. Exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive data, or disrupt system operations. Since the vulnerability affects the MediaStream API, which is commonly used in modern web applications for audio and video capture, attackers could leverage this to compromise communication tools or browser-based conferencing platforms. The requirement for user interaction (visiting a malicious page) means phishing or drive-by download attacks are plausible vectors. The broad deployment of Chrome across enterprises, government agencies, and consumer devices worldwide increases the risk of widespread exploitation. Organizations with high-value targets or sensitive data are particularly at risk, as attackers could use this vulnerability as an initial foothold or lateral movement vector. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of patching, as public disclosure often leads to rapid development of exploit code.

Mitigation Recommendations

To mitigate CVE-2026-3922, organizations and users should immediately update Google Chrome to version 146.0.7680.71 or later, where the vulnerability is patched. Beyond patching, organizations should implement strict web content filtering to block access to untrusted or malicious websites that could host exploit code. Deploying browser security features such as site isolation, sandboxing, and disabling unnecessary MediaStream permissions can reduce the attack surface. Security teams should monitor network traffic and endpoint behavior for signs of exploitation attempts, including unusual heap corruption indicators or suspicious process activity. Employing endpoint detection and response (EDR) solutions with behavioral analytics can help detect exploitation attempts early. User awareness training to recognize phishing and suspicious links is also critical, given the need for user interaction. For high-security environments, consider restricting or controlling browser extensions and plugins that interact with MediaStream APIs. Finally, maintain an up-to-date inventory of browser versions in use across the organization to ensure timely patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-11T05:54:10.393Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b2c3542f860ef94391644e

Added to database: 3/12/2026, 1:44:52 PM

Last enriched: 3/20/2026, 2:49:02 AM

Last updated: 4/28/2026, 4:51:48 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses