Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3926: Out of bounds read in Google Chrome

0
High
VulnerabilityCVE-2026-3926cvecve-2026-3926
Published: Wed Mar 11 2026 (03/11/2026, 22:04:09 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

AI-Powered Analysis

AILast updated: 03/12/2026, 18:54:17 UTC

Technical Analysis

CVE-2026-3926 is a security vulnerability identified in the V8 JavaScript engine component of Google Chrome prior to version 146.0.7680.71. The vulnerability is classified as an out-of-bounds read, meaning that when processing certain crafted HTML content, the V8 engine may read memory outside the intended buffer boundaries. This can lead to unintended information disclosure or potentially cause the browser to behave unpredictably or crash. The vulnerability can be triggered remotely by an attacker who entices a user to visit a maliciously crafted web page, requiring no prior authentication but user interaction. The flaw stems from improper bounds checking within V8’s memory management routines, allowing access to memory regions that should be inaccessible. Although no public exploits have been reported yet, the vulnerability is significant because it affects a widely used browser component and could be leveraged as part of a larger exploit chain. Google has addressed the issue in Chrome version 146.0.7680.71, but users running older versions remain vulnerable. The lack of a CVSS score means severity must be inferred from the technical details and potential impact.

Potential Impact

The primary impact of CVE-2026-3926 is the potential unauthorized disclosure of sensitive information from the browser’s memory, which could include user data, session tokens, or other confidential information. Additionally, out-of-bounds reads can lead to application instability or crashes, impacting availability. While this vulnerability alone may not allow full remote code execution, it can be a stepping stone for more complex attacks, such as sandbox escapes or privilege escalation. Organizations worldwide that rely heavily on Google Chrome for web access are at risk, especially those handling sensitive or regulated data. The vulnerability’s remote exploitation capability increases the attack surface, as attackers only need to lure users to malicious websites. This can affect enterprise environments, government agencies, and individual users alike, potentially leading to data breaches or operational disruptions.

Mitigation Recommendations

The most effective mitigation is to update Google Chrome to version 146.0.7680.71 or later, where the vulnerability has been patched. Organizations should enforce automated browser updates or centrally manage patch deployment to ensure all endpoints are protected promptly. Additionally, implementing browser security policies such as disabling JavaScript on untrusted sites, using content security policies (CSP), and employing browser isolation technologies can reduce exposure. Network-level protections like web filtering and threat intelligence-based blocking of malicious URLs can help prevent users from accessing crafted pages. Security teams should monitor for any emerging exploit attempts and educate users about the risks of visiting untrusted websites. Regular vulnerability scanning and penetration testing can help identify if outdated browser versions remain in use within the environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-11T05:54:11.499Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b30a512f860ef943dbd434

Added to database: 3/12/2026, 6:47:45 PM

Last enriched: 3/12/2026, 6:54:17 PM

Last updated: 3/13/2026, 6:01:45 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses