Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4679: Integer overflow in Google Chrome

0
High
VulnerabilityCVE-2026-4679cvecve-2026-4679
Published: Tue Mar 24 2026 (03/24/2026, 00:24:42 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Chrome

Description

Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:01:35 UTC

Technical Analysis

CVE-2026-4679 is a security vulnerability identified in the font rendering subsystem of Google Chrome prior to version 146.0.7680.165. The root cause is an integer overflow that occurs when processing font data embedded in HTML pages. This overflow leads to an out-of-bounds memory write, which can corrupt memory and potentially allow a remote attacker to execute arbitrary code within the context of the browser process. The attack vector involves a maliciously crafted HTML page that, when loaded by a victim's browser, triggers the overflow. Because Chrome is a sandboxed environment, exploitation may require chaining with other vulnerabilities for full system compromise, but browser compromise alone can lead to data theft, session hijacking, or further network intrusion. The vulnerability does not require prior authentication but does require user interaction, specifically visiting or rendering the malicious page. No public exploits have been reported yet, but the Chromium security team has rated the severity as high due to the potential impact and ease of exploitation. The vulnerability affects all platforms running vulnerable Chrome versions, including Windows, macOS, Linux, and mobile platforms. The absence of a CVSS score means severity assessment must consider impact on confidentiality, integrity, availability, ease of exploitation, and scope. Given the potential for remote code execution and broad user base, this vulnerability is critical to address promptly.

Potential Impact

The impact of CVE-2026-4679 is significant for organizations worldwide due to the widespread use of Google Chrome as a primary web browser. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full browser compromise. This can result in data theft, credential exposure, session hijacking, installation of malware, or pivoting to internal networks. The vulnerability threatens confidentiality by exposing sensitive user data, integrity by allowing unauthorized code execution, and availability if exploited to crash or destabilize the browser. Since Chrome is often used to access corporate resources, the vulnerability could serve as an initial attack vector for broader network intrusion. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly once details are public. Organizations with high reliance on Chrome for business operations, especially those handling sensitive or regulated data, face elevated risk. The vulnerability also poses a threat to individual users, particularly those in high-risk environments or targeted by advanced threat actors.

Mitigation Recommendations

To mitigate CVE-2026-4679, organizations and users should immediately update Google Chrome to version 146.0.7680.165 or later, where the vulnerability is patched. Beyond patching, organizations should implement browser security best practices such as disabling or restricting font downloads where feasible, using browser sandboxing and process isolation features, and employing endpoint protection solutions capable of detecting anomalous browser behavior. Network-level defenses like web filtering and intrusion prevention systems should be configured to block access to known malicious sites and suspicious HTML content. Security teams should monitor browser crash logs and unusual memory access patterns that could indicate exploitation attempts. User education is critical to reduce the risk of visiting untrusted websites. For high-security environments, consider deploying browser isolation technologies or restricting browser usage to trusted sites only. Regular vulnerability scanning and threat intelligence updates will help detect emerging exploits related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Chrome
Date Reserved
2026-03-23T21:08:18.589Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c1dec2f4197a8e3babfa48

Added to database: 3/24/2026, 12:45:54 AM

Last enriched: 3/24/2026, 1:01:35 AM

Last updated: 3/24/2026, 1:58:28 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses