Chrome Security Updates by Google Released For Actively Exploited Zero-Day 2026

Summary : Google has released an emergency security update for its Google Chrome browser to address the first actively exploited zero-day vulnerability of 2026. The flaw is reported to be exploited in real-world attacks before a patch is made available. The flaw is a “Use After Free” fragility in the browser’s CSS component, which can be triggered by a malicious webpage to achieve remote code execution.

OEM Google 
Severity High 
CVSS Score 8.8 
CVEs CVE-2026-2441 
POC Available No 
Actively Exploited Yes 
Exploited in Wild Yes 
Advisory Version 1.0 

Overview 

Security researcher Shaheen Fazim reported the flaw on February 11, 2026, prompting a swift response from Google’s security team.

The vulnerability impacts Chrome’s browser engine and may allow attackers to execute arbitrary code or cause system compromise via specially crafted web content.

Google acknowledged this active exploitation and released an out-of-band security patch to mitigate the threat. 

      Vulnerability Name CVE ID Product Affected Severity Fixed Version 
Chrome Zero-Day – Type Confusion / Memory Corruption CVE-2026-2441 Google Chrome (All platforms prior to patched build) High v145.0.7632.75/.76 (Win/macOS), v144.0.7559.75 (Linux) 

Technical Summary 

The vulnerability is a memory safety issue involving improper handling of objects within Chrome’s rendering engine.

This type of flaw, often categorized as a type of confusion or memory corruption vulnerability, can allow attackers to manipulate memory in a way that leads to arbitrary code execution. 

By convincing a victim to visit a malicious webpage, an attacker may trigger the flaw without additional user interaction. Successful exploitation could allow: 

  • Remote code execution 
  • Sandbox escape (in chained attacks) 
  • Data theft 
  • Installation of malware or spyware 
  • Full browser compromise 

Google confirmed that the vulnerability has been exploited in the wild, though technical details are currently limited to prevent further abuse. 

CVE ID System Affected Vulnerability Details Impact 
CVE-2026-2441 Google Chrome prior to patched versions Use-after-free in CSS engine allowing memory corruption RCE, Data exfiltration, System compromise 

Devices affected  

The vulnerability impacts: 

  • Google Chrome on Windows 
  • Google Chrome on macOS 
  • Google Chrome on Linux 

Chromium-based browsers may also be affected depending on version alignment. 

Remediation:  

Upgrade immediately to Google chrome with below mentioning fixed versions- 

  • Windows/macOS: 145.0.7632.75 / 145.0.7632.76 
  • Linux: 144.0.7559.75. 

If immediate patching is not possible, implement the following interim controls: 

  1. Restrict access to untrusted or high-risk websites. 
  1. Disable unnecessary or unverified browser extensions. 
  1. Enforce endpoint protection and continuous monitoring. 
  1. Implement web filtering, DNS security, and monitor for abnormal browser behavior. 

Threat Mitigation : 
This Chrome zero-day vulnerability marks the first actively exploited browser flaw of 2026. Given confirmed exploitation in real-world attacks, organizations and individual users must apply the security update immediately.

Browsers are the modern operating system of the internet. When one window cracks, the whole house feels the draft. Patch fast, monitor closely, and stay ahead of the storm. 

Users are also encouraged to enable automatic updates in their Chrome browser to ensure that their software is updated promptly.

References:  

Hashtags 

#Infosec #CyberSecurity #SecurityAdvisory #chrome  #ZeroDay #VulnerabilityManagement #PatchNow #SOC #MobileSecurity #ThreatIntelligence #Intrucept 

One comment

  1. طلسم says:

    Hello – Don’t be tired of being active and producing content for your audience – You chose a good topic to explain – Thank you https://incw.ir/

Scroll to top