Categories: Cyber Security News

Chrome Security Update Fixes 26 Vulnerabilities Allowing Remote Code Execution

Google has released a substantial security update for its Chrome web browser, addressing 26 distinct vulnerabilities that could allow unauthenticated attackers to execute malicious code remotely.

The latest Stable channel update rolls out versions 146.0.7680.153 and 146.0.7680.154 for Windows and macOS, while Linux users will receive version 146.0.7680.153.

This critical patch cycle is designed to remediate multiple severe memory corruption flaws that pose significant risks to individual users and enterprise networks alike.

Tailored to standard cybersecurity reporting formats, this breakdown highlights the most severe threats mitigated in this release.

Critical Vulnerabilities and RCE Risks

The primary threat vector for these vulnerabilities lies in how the browser processes specialized web content.

By exploiting flaws in components such as WebGL, WebRTC, and the V8 JavaScript engine, threat actors can bypass standard browser security sandboxes.

The update specifically addresses three “Critical” severity vulnerabilities, 22 “High” severity flaws, and one “Medium” severity issue.

These vulnerabilities primarily consist of classic memory management errors such as use-after-free conditions, heap buffer overflows, and out-of-bounds access.

When an attacker successfully triggers one of these conditions, typically by luring a victim to a maliciously crafted webpage, they can write payloads directly into system memory and achieve remote code execution (RCE).

Beyond the critical flaws, the 22 high-severity vulnerabilities affect a wide array of core browser modules, including Blink, Network, WebAudio, Dawn, and PDFium.

Notably, a single security researcher operating under the pseudonym “c6eed09fc8b174b0f3eebedcceb1e792” discovered and reported nine high-severity issues, as well as one critical vulnerability.

CVE Identifier Severity Browser Component Vulnerability Type
CVE-2026-4439 Critical WebGL Out of bounds memory access
CVE-2026-4440 Critical WebGL Out of bounds read and write
CVE-2026-4441 Critical Base Use after free
CVE-2026-4442 High CSS Heap buffer overflow
CVE-2026-4443 High WebAudio Heap buffer overflow
CVE-2026-4444 High WebRTC Stack buffer overflow
CVE-2026-4445 High WebRTC Use after free
CVE-2026-4446 High WebRTC Use after free
CVE-2026-4447 High V8 Inappropriate implementation
CVE-2026-4448 High ANGLE Heap buffer overflow
CVE-2026-4449 High Blink Use after free
CVE-2026-4450 High V8 Out of bounds write
CVE-2026-4451 High Navigation Insufficient validation of untrusted input
CVE-2026-4452 High ANGLE Integer overflow
CVE-2026-4453 High Dawn Integer overflow
CVE-2026-4454 High Network Use after free
CVE-2026-4455 High PDFium Heap buffer overflow
CVE-2026-4456 High Digital Credentials API Use after free
CVE-2026-4457 High V8 Type Confusion
CVE-2026-4458 High Extensions Use after free
CVE-2026-4459 High WebAudio Out of bounds read and write
CVE-2026-4460 High Skia Out of bounds read
CVE-2026-4461 High V8 Inappropriate implementation
CVE-2026-4462 High Blink Out of bounds read
CVE-2026-4463 High WebRTC Heap buffer overflow
CVE-2026-4464 Medium ANGLE Integer overflow

WebGL vulnerabilities are particularly dangerous because they interact directly with the hardware graphics processing unit, potentially allowing attackers to escape software constraints.

Similarly, the V8 JavaScript engine remains a high-value target; vulnerabilities like type confusion (CVE-2026-4457) enable attackers to manipulate how the engine handles object types.

Google noted that many of these bugs were proactively identified during development using advanced memory testing tools such as AddressSanitizer, MemorySanitizer, and libFuzzer.

To mitigate the risk of system compromise, users and enterprise administrators are strongly advised to verify their browser versions immediately.

While Google is rolling out the update progressively over the coming days and weeks, proactive manual updates can prevent exploitation by opportunistic threat actors.

As is standard practice, Google will restrict public access to detailed bug reports and exploit chains until a vast majority of the user base has successfully applied the patch.

This delayed disclosure strategy successfully prevents threat actors from reverse-engineering the patches to develop zero-day exploits targeting slow-to-update systems.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Chrome Security Update Fixes 26 Vulnerabilities Allowing Remote Code Execution appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Threat Actors Leverage Copyright-Themed Emails to Drop PureLog Stealer

Threat actors are deploying a sophisticated multi-stage malware campaign to distribute the PureLog Stealer. Disguised…

1 hour ago

Threat Actors Leverage Copyright-Themed Emails to Drop PureLog Stealer

Threat actors are deploying a sophisticated multi-stage malware campaign to distribute the PureLog Stealer. Disguised…

1 hour ago

Oracle Issues Urgent Security Update for Critical RCE Flaw in Identity Manager and Web Services Manager

Oracle has issued an out-of-band Security Alert addressing a critical remote code execution (RCE) vulnerability,…

1 hour ago

New Haven Recognized As 2025 Tree City USA For Commitment To Urban Forestry

NEW HAVEN, Ind. (WOWO) — The city of New Haven, Indiana has been named a…

2 hours ago

Cold weather, delayed harvest the root of carrot shortage appearing in local grocery stores

A flyer fastened with tape to the bare carrot display at Hannaford in Concord caught…

2 hours ago

Brian O’Sullivan was a man of many talents, uncompromising ethics

To his young patients with cystic fibrosis, Brian O’Sullivan was the fun doctor with the…

2 hours ago

This website uses cookies.