Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4675: Heap buffer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-4675cvecve-2026-4675
Published: Tue Mar 24 2026 (03/24/2026, 00:24:41 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:02:32 UTC

Technical Analysis

CVE-2026-4675 is a heap buffer overflow vulnerability found in the WebGL implementation of Google Chrome prior to version 146.0.7680.165. WebGL is a web standard that allows rendering interactive 3D graphics within browsers using the GPU. The vulnerability arises from improper bounds checking during memory operations related to WebGL, allowing a remote attacker to perform an out-of-bounds memory read. This can be triggered by crafting a malicious HTML page that, when loaded by a victim's browser, causes the browser to read memory beyond allocated buffers on the heap. While the vulnerability does not explicitly mention write or code execution, out-of-bounds reads can lead to information disclosure, potentially leaking sensitive data from browser memory or enabling further exploitation chains. The attack vector is remote and requires no authentication, but user interaction is necessary in the form of visiting a malicious or compromised website. Google has classified this vulnerability as high severity, reflecting the significant risk posed by memory corruption bugs in a widely used browser component. The vulnerability affects all platforms running the vulnerable Chrome versions, including Windows, macOS, Linux, and potentially mobile platforms. No public exploit code or active exploitation has been reported to date. The absence of a CVSS score means severity assessment must consider the impact on confidentiality, integrity, and availability, ease of exploitation, and scope of affected systems. Given the widespread use of Chrome and the nature of the vulnerability, this is a critical security issue requiring prompt remediation.

Potential Impact

The primary impact of CVE-2026-4675 is the potential for remote attackers to read out-of-bounds memory in the Chrome browser's WebGL component, which can lead to information disclosure of sensitive data stored in browser memory. This could include user credentials, session tokens, or other private information. Additionally, memory corruption vulnerabilities often serve as stepping stones for more severe exploits, such as arbitrary code execution or sandbox escape, although this specific vulnerability is described as an out-of-bounds read. The vulnerability affects all users running vulnerable Chrome versions, making it a global concern. Organizations relying heavily on Chrome for web access, especially those handling sensitive data or operating in high-risk sectors (finance, government, healthcare), face increased risk of data leakage or targeted attacks. The requirement for user interaction (visiting a malicious page) means phishing or drive-by download attacks could be vectors. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits post-disclosure. Failure to patch promptly could result in widespread exploitation, data breaches, and erosion of user trust.

Mitigation Recommendations

1. Immediate update of all affected Google Chrome installations to version 146.0.7680.165 or later, which contains the patch for this vulnerability. 2. Deploy enterprise-wide browser update policies to ensure timely patching and prevent use of outdated versions. 3. Employ web filtering and URL reputation services to block access to known malicious or suspicious websites that could host exploit pages. 4. Educate users about the risks of visiting untrusted websites and the importance of browser updates. 5. Utilize endpoint detection and response (EDR) solutions to monitor for anomalous browser behavior indicative of exploitation attempts. 6. For high-security environments, consider disabling or restricting WebGL usage via browser policies or extensions until patches are applied. 7. Monitor threat intelligence feeds for any emergence of exploit code or active attacks targeting this vulnerability. 8. Conduct regular vulnerability scanning and penetration testing to verify patch deployment and identify residual risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-23T21:08:17.405Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c1debff4197a8e3babf885

Added to database: 3/24/2026, 12:45:51 AM

Last enriched: 3/24/2026, 1:02:32 AM

Last updated: 3/24/2026, 6:02:24 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses