CVE-2026-3929: Side-channel information leakage in Google Chrome
Side-channel information leakage in ResourceTiming in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
AI Analysis
Technical Summary
CVE-2026-3929 is a side-channel vulnerability affecting the ResourceTiming API in Google Chrome versions prior to 146.0.7680.71. The ResourceTiming API is designed to provide detailed timing information about resource loading, which can be leveraged by web developers for performance analysis. However, this vulnerability allows a remote attacker to exploit timing discrepancies to infer cross-origin resource loading information, effectively leaking data that should be inaccessible due to same-origin policy restrictions. The attack vector involves a crafted HTML page that, when visited by a user, can measure timing data to deduce sensitive information from other origins. The vulnerability does not require privileges or authentication but does require user interaction (visiting the malicious page). The attack complexity is high, as precise timing measurements and controlled conditions are necessary. The flaw impacts confidentiality by exposing cross-origin data but does not compromise data integrity or system availability. Google assigned a CVSS v3.1 base score of 3.1, categorizing it as a low-severity issue. The vulnerability was publicly disclosed on March 11, 2026, with no known active exploits reported. The recommended remediation is to update Chrome to version 146.0.7680.71 or later, where the issue has been addressed.
Potential Impact
The primary impact of CVE-2026-3929 is the potential leakage of sensitive cross-origin data through side-channel timing attacks. Organizations relying on Google Chrome for web access could face confidentiality risks if users visit malicious sites designed to exploit this vulnerability. Although the attack requires user interaction and has a high complexity, successful exploitation could expose information such as resource load timings that might be used to infer user behavior, visited sites, or other sensitive metadata. This could aid attackers in profiling users or conducting further targeted attacks. However, the vulnerability does not affect the integrity or availability of systems. Given the low CVSS score and lack of known exploits, the immediate risk is limited but should not be ignored, especially for high-security environments where data confidentiality is critical.
Mitigation Recommendations
To mitigate CVE-2026-3929, organizations and users should promptly update Google Chrome to version 146.0.7680.71 or later, where the vulnerability is patched. Beyond patching, administrators should consider implementing Content Security Policy (CSP) headers that restrict resource loading and reduce the attack surface for malicious timing attacks. Employing browser isolation or sandboxing techniques can limit the impact of visiting untrusted websites. Network-level filtering to block access to known malicious domains can also reduce exposure. Security teams should monitor web traffic for suspicious patterns indicative of timing attacks. Educating users about the risks of visiting untrusted or suspicious websites can further reduce the likelihood of exploitation. Finally, organizations should maintain an up-to-date inventory of browser versions in use to ensure timely patch deployment.
Affected Countries
United States, United Kingdom, Germany, France, Japan, South Korea, Canada, Australia, India, Brazil
CVE-2026-3929: Side-channel information leakage in Google Chrome
Description
Side-channel information leakage in ResourceTiming in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
AI-Powered Analysis
Technical Analysis
CVE-2026-3929 is a side-channel vulnerability affecting the ResourceTiming API in Google Chrome versions prior to 146.0.7680.71. The ResourceTiming API is designed to provide detailed timing information about resource loading, which can be leveraged by web developers for performance analysis. However, this vulnerability allows a remote attacker to exploit timing discrepancies to infer cross-origin resource loading information, effectively leaking data that should be inaccessible due to same-origin policy restrictions. The attack vector involves a crafted HTML page that, when visited by a user, can measure timing data to deduce sensitive information from other origins. The vulnerability does not require privileges or authentication but does require user interaction (visiting the malicious page). The attack complexity is high, as precise timing measurements and controlled conditions are necessary. The flaw impacts confidentiality by exposing cross-origin data but does not compromise data integrity or system availability. Google assigned a CVSS v3.1 base score of 3.1, categorizing it as a low-severity issue. The vulnerability was publicly disclosed on March 11, 2026, with no known active exploits reported. The recommended remediation is to update Chrome to version 146.0.7680.71 or later, where the issue has been addressed.
Potential Impact
The primary impact of CVE-2026-3929 is the potential leakage of sensitive cross-origin data through side-channel timing attacks. Organizations relying on Google Chrome for web access could face confidentiality risks if users visit malicious sites designed to exploit this vulnerability. Although the attack requires user interaction and has a high complexity, successful exploitation could expose information such as resource load timings that might be used to infer user behavior, visited sites, or other sensitive metadata. This could aid attackers in profiling users or conducting further targeted attacks. However, the vulnerability does not affect the integrity or availability of systems. Given the low CVSS score and lack of known exploits, the immediate risk is limited but should not be ignored, especially for high-security environments where data confidentiality is critical.
Mitigation Recommendations
To mitigate CVE-2026-3929, organizations and users should promptly update Google Chrome to version 146.0.7680.71 or later, where the vulnerability is patched. Beyond patching, administrators should consider implementing Content Security Policy (CSP) headers that restrict resource loading and reduce the attack surface for malicious timing attacks. Employing browser isolation or sandboxing techniques can limit the impact of visiting untrusted websites. Network-level filtering to block access to known malicious domains can also reduce exposure. Security teams should monitor web traffic for suspicious patterns indicative of timing attacks. Educating users about the risks of visiting untrusted or suspicious websites can further reduce the likelihood of exploitation. Finally, organizations should maintain an up-to-date inventory of browser versions in use to ensure timely patch deployment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Chrome
- Date Reserved
- 2026-03-11T05:54:12.459Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b30a4f2f860ef943dbd373
Added to database: 3/12/2026, 6:47:43 PM
Last enriched: 3/12/2026, 6:51:46 PM
Last updated: 3/14/2026, 1:46:54 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.