SentinelOne
CVE Vulnerability Database

CVE-2026-3909: Google Chrome RCE Vulnerability

CVE-2026-3909 is a remote code execution vulnerability in Google Chrome caused by an out of bounds write in Skia. Attackers can exploit this via crafted HTML pages. This article covers technical details, affected versions, and mitigation.

Published:

CVE-2026-3909 Overview

CVE-2026-3909 is a high-severity out-of-bounds write vulnerability in the Skia graphics library used by Google Chrome. This memory corruption flaw exists in Chrome versions prior to 146.0.7680.75 and allows a remote attacker to perform out-of-bounds memory access via a specially crafted HTML page. The vulnerability has been classified as CWE-787 (Out-of-bounds Write) and is actively being exploited in the wild.

Critical Impact

This vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation in the wild. Remote attackers can leverage this flaw to potentially achieve arbitrary code execution on victim systems simply by convincing a user to visit a malicious webpage.

Affected Products

  • Google Chrome prior to version 146.0.7680.75
  • Chrome on Microsoft Windows
  • Chrome on Apple macOS
  • Chrome on Linux

Discovery Timeline

  • 2026-03-13 - CVE-2026-3909 published to NVD
  • 2026-03-13 - Last updated in NVD database

Technical Details for CVE-2026-3909

Vulnerability Analysis

This vulnerability resides within Skia, the open-source 2D graphics library that serves as the rendering engine for Google Chrome and numerous other applications. Skia handles complex graphics operations including text rendering, image decoding, and vector graphics processing. The out-of-bounds write flaw allows attackers to write data beyond the boundaries of allocated memory buffers during graphics rendering operations.

When Chrome processes a maliciously crafted HTML page containing specific graphical elements, the Skia library fails to properly validate boundary conditions before performing write operations. This can lead to corruption of adjacent memory regions, potentially allowing an attacker to overwrite critical data structures or inject malicious code into memory.

The vulnerability requires user interaction—a victim must navigate to an attacker-controlled webpage or view attacker-supplied content rendered by Chrome. However, the attack complexity is low, as no authentication or special privileges are required beyond convincing a user to visit a malicious site.

Root Cause

The root cause of CVE-2026-3909 is insufficient bounds checking within Skia's memory management routines when processing certain graphical operations. The affected code path fails to validate that write operations remain within the allocated buffer boundaries, allowing data to be written to unintended memory locations.

Out-of-bounds write vulnerabilities in graphics libraries typically arise from integer overflow conditions in dimension calculations, improper handling of edge cases in image processing, or race conditions in multi-threaded rendering pipelines. While specific technical details remain restricted in the Chromium Issue Tracker, the vulnerability follows patterns common to graphics library memory corruption flaws.

Attack Vector

The attack vector for CVE-2026-3909 is network-based, requiring an attacker to deliver malicious content to a victim's browser. Attack scenarios include:

A threat actor crafts a malicious HTML page containing specially constructed graphical elements designed to trigger the out-of-bounds write condition in Skia. When a victim visits this page—whether through phishing emails, watering hole attacks, or malicious advertisements—Chrome attempts to render the content, triggering the vulnerability.

Successful exploitation could allow the attacker to corrupt memory in a controlled manner, potentially leading to arbitrary code execution within the Chrome sandbox. Combined with sandbox escape techniques, this could result in full system compromise.

The vulnerability affects all major desktop operating systems where Chrome is deployed, including Windows, macOS, and Linux, significantly expanding the potential attack surface.

Detection Methods for CVE-2026-3909

Indicators of Compromise

  • Unexpected Chrome renderer process crashes or instability during normal browsing
  • Detection of exploit kits or malicious JavaScript targeting Skia rendering functions in network traffic
  • Memory access violations or abnormal memory allocation patterns in Chrome processes
  • Suspicious outbound network connections following browser crashes

Detection Strategies

  • Monitor Chrome crash reports for patterns consistent with memory corruption in rendering components
  • Deploy network-based detection rules to identify known exploit patterns targeting Skia vulnerabilities
  • Enable Chrome's enhanced protection features and monitor for blocked content warnings
  • Utilize endpoint detection and response (EDR) solutions to identify anomalous Chrome process behavior

Monitoring Recommendations

  • Configure centralized logging for Chrome crash dumps and analyze for exploitation indicators
  • Monitor for indicators listed in the CISA KEV catalog entry for this vulnerability
  • Implement browser version auditing across the enterprise to identify unpatched installations
  • Enable SentinelOne's behavioral AI to detect memory exploitation techniques targeting browser processes

How to Mitigate CVE-2026-3909

Immediate Actions Required

  • Update Google Chrome to version 146.0.7680.75 or later immediately across all systems
  • Verify automatic updates are enabled in Chrome settings (chrome://settings/help)
  • Prioritize patching for systems with direct internet access or used for web browsing
  • Consider temporarily restricting access to untrusted websites until patches are deployed

Patch Information

Google has released Chrome version 146.0.7680.75 to address this vulnerability. The update is available through Chrome's built-in automatic update mechanism and can be manually triggered by navigating to chrome://settings/help. Organizations should verify patch deployment across their environment using asset management tools.

For detailed patch information, refer to the Google Chrome Stable Channel Update announcement.

Workarounds

  • Enable Chrome's Site Isolation feature (chrome://flags/#enable-site-per-process) for enhanced process separation
  • Consider using browser isolation solutions for high-risk browsing activities
  • Implement network-level blocking for known malicious domains and exploit kit infrastructure
  • Deploy Content Security Policy headers on internal web applications to reduce attack surface
bash
# Verify Chrome version on Linux/macOS systems
google-chrome --version

# Force Chrome update check (restart required)
# Navigate to: chrome://settings/help

# Enterprise deployment - verify version across endpoints
# Use enterprise management tools to query Chrome version
# Ensure version is 146.0.7680.75 or higher

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.