Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4440: Out of bounds read and write in Google Chrome

0
Unknown
VulnerabilityCVE-2026-4440cvecve-2026-4440
Published: Fri Mar 20 2026 (03/20/2026, 01:34:44 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Out of bounds read and write in WebGL in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Critical)

AI-Powered Analysis

AILast updated: 03/20/2026, 02:54:06 UTC

Technical Analysis

CVE-2026-4440 is a security vulnerability identified in the WebGL component of Google Chrome prior to version 146.0.7680.153. The flaw arises from improper bounds checking during WebGL operations, leading to out-of-bounds read and write conditions. WebGL is a widely used API for rendering interactive 3D graphics within browsers, and this vulnerability allows attackers to craft malicious HTML pages that trigger these out-of-bounds accesses. By exploiting this, an attacker can perform arbitrary memory reads and writes within the browser process, potentially leading to arbitrary code execution, data leakage, or browser instability. Since the attack vector is a crafted webpage, exploitation requires the victim to visit a malicious or compromised site. The vulnerability affects the confidentiality, integrity, and availability of the affected system by enabling attackers to manipulate browser memory. Although no public exploits are currently known, the critical severity assigned by Chromium underscores the high risk. The vulnerability was publicly disclosed on March 20, 2026, with no CVSS score assigned yet. The absence of a patch link suggests users should update to the fixed Chrome version 146.0.7680.153 or later as soon as possible to mitigate the risk.

Potential Impact

The impact of CVE-2026-4440 is significant for organizations worldwide relying on Google Chrome for web access. Successful exploitation can lead to arbitrary code execution within the browser context, allowing attackers to bypass security controls, steal sensitive data, or deploy malware. This can compromise user confidentiality and integrity of data processed or accessed through the browser. Additionally, the vulnerability can cause browser crashes or instability, affecting availability. Organizations with employees or users who access untrusted or external web content are particularly vulnerable. Given Chrome's dominant market share globally, the scope of affected systems is vast, spanning enterprises, governments, and individual users. The ability to exploit remotely via crafted web content without authentication increases the threat level. This vulnerability could be leveraged in targeted attacks, drive-by downloads, or widespread phishing campaigns, posing a critical risk to information security and operational continuity.

Mitigation Recommendations

To mitigate CVE-2026-4440, organizations should immediately update all instances of Google Chrome to version 146.0.7680.153 or later, where the vulnerability is patched. Enterprises should enforce automated browser update policies to ensure timely deployment of security fixes. Network defenses such as web proxies and secure web gateways should be configured to block access to known malicious sites and filter suspicious HTML content. Employing endpoint detection and response (EDR) solutions can help detect anomalous browser behaviors indicative of exploitation attempts. User education is critical to reduce the risk of visiting untrusted websites or clicking on suspicious links. Additionally, disabling or restricting WebGL usage via browser policies can reduce the attack surface, especially in high-security environments where WebGL functionality is not required. Continuous monitoring of threat intelligence feeds for any emerging exploit code or attack campaigns related to this vulnerability is recommended to enable rapid response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-19T20:23:47.604Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bcafd6e32a4fbe5f174c32

Added to database: 3/20/2026, 2:24:22 AM

Last enriched: 3/20/2026, 2:54:06 AM

Last updated: 3/20/2026, 3:42:17 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses