Categories: Cyber Security News

Google Chrome Zero-Day Flaw Under Active Exploitation by Threat Actors

Google has urgently patched a high-severity zero-day vulnerability in Chrome, confirming active exploitation in the wild.

On February 13, 2026, the Stable Channel rolled out updates to versions 145.0.7632.75/76 for Windows and Mac, and 144.0.7559.75 for Linux.

This fix addresses CVE-2026-2441, a use-after-free flaw in the CSS component, reported by security researcher Shaheen Fazim just two days earlier on February 11.

Google explicitly states it is aware of exploits targeting this bug, urging users to update immediately to mitigate risks.

The vulnerability stems from a memory corruption issue where freed CSS objects are accessed post-deallocation, potentially enabling arbitrary code execution.

Attackers could leverage this through malicious web pages, tricking users into visiting compromised sites.

As a zero-day, it evaded detection until Fazim’s report, highlighting the pace of modern threat actors.

Chrome’s update log details the changes from 145.0.7632.67, with restricted bug access until most users patch. This marks the first exploited zero-day in Chrome’s 2026 Stable Channel.

Key Technical Details and Patch Information

CVE ID CVSS Score Affected Versions Patched Versions Attack Vector
CVE-2026-2441 8.8 (High) Chrome <145.0.7632.75 (Win/Mac)
<144.0.7559.75 (Linux)
145.0.7632.75/76 (Win/Mac)
144.0.7559.75 (Linux)
Network (webpage)

No specific IOCs like malware hashes or attacker IPs have surfaced publicly yet, but CISA and Microsoft security teams are monitoring for related campaigns.

Enterprises should prioritize auto-updates via Group Policy and scan for outdated instances of Chrome.

Detection relies on memory sanitizers like AddressSanitizer, which Google credits for many pre-stable fixes.

This incident underscores Chrome’s dominance as a target, with a Google Chrome Zero-Day Flaw Under Active Exploitation by Threat Actors, holding over 65% of the global browser share, making it prime for drive-by attacks.

Fazim’s quick reporting via Chromium’s bug bounty earned rewards, but real-world exploits amplify urgency. Users on older versions face a high risk of remote code execution without symptoms.

Google retains bug details under its policy for third-party library dependencies.

Update now through Chrome’s Help > About menu. For Linux admins, verify via package managers. Stay vigilant for phishing lures mimicking a legit site.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Google Chrome Zero-Day Flaw Under Active Exploitation by Threat Actors appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Juvenile on mini-bike struck by SUV in South Beloit, hospitalized

A juvenile riding a mini-bike in South Beloit was hit by an SUV and taken…

4 minutes ago

Juvenile on mini-bike struck by SUV in South Beloit, hospitalized

A juvenile riding a mini-bike in South Beloit was hit by an SUV and taken…

4 minutes ago

Six Flags Great America to celebrate 50th anniversary with summer-long special

Six Flags Great America will host a historic, summer-long 50th anniversary celebration offering families special…

5 minutes ago

Six Flags Great America to celebrate 50th anniversary with summer-long special

Six Flags Great America will host a historic, summer-long 50th anniversary celebration offering families special…

5 minutes ago

Best Buy Is Having a Massive One-Day Sale on Magic: The Gathering

Magic: The Gathering is a fun hobby, but it’s not a cheap one, making finding…

12 minutes ago

Scooby-Doo: First Look at the Cast and Full Title Revealed for the Netflix Live-Action Series

Production has begun on the live-action streaming series Scooby-Doo: Origins, Netflix announced Friday. The streamer…

13 minutes ago

This website uses cookies.