Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4677: Out of bounds read in Google Chrome

0
High
VulnerabilityCVE-2026-4677cvecve-2026-4677
Published: Tue Mar 24 2026 (03/24/2026, 00:24:42 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:02:06 UTC

Technical Analysis

CVE-2026-4677 is an out-of-bounds read vulnerability found in the WebAudio implementation of Google Chrome versions prior to 146.0.7680.165. The flaw arises from improper handling of memory boundaries when processing audio data within the browser's WebAudio API. An attacker can exploit this vulnerability remotely by luring a user to visit a specially crafted HTML page containing malicious WebAudio code. This triggers an out-of-bounds memory read, potentially allowing the attacker to access sensitive information from the browser's memory space. Although this vulnerability does not directly allow code execution, the information disclosure can facilitate further attacks such as sandbox escape or privilege escalation. The vulnerability is classified as high severity by Chromium security, reflecting the significant risk posed by remote exploitation without user authentication. No CVSS score has been assigned yet, and no public exploits have been reported. The vulnerability affects all platforms running the vulnerable Chrome versions, including Windows, macOS, Linux, and mobile platforms. The lack of a patch link suggests that users should upgrade to Chrome version 146.0.7680.165 or later once available to remediate the issue.

Potential Impact

The primary impact of CVE-2026-4677 is unauthorized disclosure of sensitive information from browser memory, which can compromise user privacy and security. Attackers can leverage this information to bypass security controls, conduct further exploitation, or gather intelligence on the victim's environment. Since Chrome is widely used globally, this vulnerability poses a significant risk to individuals, enterprises, and governments relying on Chrome for secure web access. The ease of exploitation—requiring only that a user visits a malicious webpage—amplifies the threat, potentially enabling mass exploitation campaigns or targeted attacks. Organizations handling sensitive data or operating in high-risk sectors such as finance, defense, and critical infrastructure face elevated risks. The vulnerability could also undermine trust in web applications and services accessed via Chrome. Although no exploits are known in the wild yet, the high severity rating and broad attack surface necessitate urgent mitigation to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2026-4677, organizations and users should promptly update Google Chrome to version 146.0.7680.165 or later once the patch is officially released. Until then, consider implementing network-level protections such as web filtering and blocking access to untrusted or suspicious websites to reduce exposure. Employ browser security features like site isolation and strict content security policies to limit the impact of potential exploitation. Security teams should monitor threat intelligence feeds for any emerging exploit code or attack campaigns targeting this vulnerability. Conduct user awareness training to avoid clicking on unknown or suspicious links. For enterprise environments, deploy centralized patch management to ensure all Chrome instances are updated swiftly. Additionally, consider sandboxing or isolating browsers in high-risk environments to contain potential memory disclosure. Regularly audit and review browser extensions and plugins, as they can increase attack surface or be leveraged in chained attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-23T21:08:18.041Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c1debff4197a8e3babf88d

Added to database: 3/24/2026, 12:45:51 AM

Last enriched: 3/24/2026, 1:02:06 AM

Last updated: 3/24/2026, 1:58:30 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses