SentinelOne
CVE Vulnerability Database

CVE-2026-4679: Google Chrome RCE Vulnerability

CVE-2026-4679 is a remote code execution flaw in Google Chrome caused by an integer overflow in Fonts. Attackers can exploit this via crafted HTML pages. This article covers technical details, affected versions, and mitigation.

Published:

CVE-2026-4679 Overview

An integer overflow vulnerability exists in the Fonts component of Google Chrome prior to version 146.0.7680.165. This memory corruption flaw enables remote attackers to perform out-of-bounds memory writes by luring victims to visit a specially crafted HTML page. The vulnerability has been classified as high severity by the Chromium security team due to its potential for arbitrary code execution.

Critical Impact

Remote attackers can exploit this integer overflow to write data beyond allocated memory boundaries, potentially leading to arbitrary code execution, browser crashes, or complete system compromise when users visit malicious web pages.

Affected Products

  • Google Chrome versions prior to 146.0.7680.165
  • Google Chrome on Microsoft Windows
  • Google Chrome on Apple macOS
  • Google Chrome on Linux

Discovery Timeline

  • 2026-03-24 - CVE-2026-4679 published to NVD
  • 2026-03-24 - Last updated in NVD database

Technical Details for CVE-2026-4679

Vulnerability Analysis

This vulnerability stems from an integer overflow condition (CWE-190) in Chrome's font rendering subsystem. When processing specially crafted font data embedded in an HTML page, the browser performs arithmetic operations on integer values that can exceed the maximum representable value, causing the integer to wrap around. This overflow leads to incorrect memory allocation sizes, enabling subsequent out-of-bounds write operations (CWE-787).

The attack requires user interaction—specifically, the victim must navigate to a malicious webpage containing the crafted font data. Once triggered, the memory corruption can overwrite critical data structures in the browser process, potentially allowing an attacker to gain control of program execution flow.

Root Cause

The root cause is an integer overflow vulnerability (CWE-190) combined with external control of critical state data (CWE-472). When the Fonts component processes untrusted input from web content, it fails to properly validate arithmetic operations on size or offset values. The integer overflow results in an undersized buffer allocation, and subsequent write operations exceed the allocated boundary, corrupting adjacent memory regions.

Attack Vector

The attack is network-based and requires user interaction. An attacker must craft a malicious HTML page containing specially designed font resources that trigger the integer overflow during parsing. The attack scenario typically involves:

  1. The attacker hosts or injects malicious HTML content containing crafted font data
  2. The victim is lured to visit the page through phishing, malvertising, or compromised legitimate websites
  3. Chrome's font rendering engine processes the malicious font data
  4. The integer overflow occurs during size calculations, resulting in incorrect memory allocation
  5. Subsequent write operations exceed buffer boundaries, enabling arbitrary memory corruption

The vulnerability allows attackers to potentially achieve arbitrary code execution within the context of the browser process, which could lead to sandbox escape attempts or other post-exploitation activities.

Detection Methods for CVE-2026-4679

Indicators of Compromise

  • Unexpected Chrome browser crashes, particularly when visiting unfamiliar websites
  • Memory access violation errors in Chrome crash logs referencing font rendering components
  • Unusual network traffic to suspicious domains serving web content with embedded fonts
  • Chrome renderer process terminations with memory corruption indicators

Detection Strategies

  • Monitor Chrome crash reports for patterns indicating memory corruption in font processing code paths
  • Deploy endpoint detection rules to identify exploitation attempts targeting browser memory safety vulnerabilities
  • Implement network-based detection for HTML pages with anomalous font resource characteristics
  • Use browser telemetry to identify renderer crashes associated with font parsing operations

Monitoring Recommendations

  • Enable Chrome's built-in crash reporting and monitor for font-related crash signatures
  • Deploy SentinelOne Singularity XDR to detect post-exploitation behaviors following browser compromise
  • Implement web proxy logging to track access to suspicious domains serving potentially malicious content
  • Monitor for unusual child process creation from Chrome renderer processes that could indicate sandbox escape

How to Mitigate CVE-2026-4679

Immediate Actions Required

  • Update Google Chrome to version 146.0.7680.165 or later immediately across all endpoints
  • Enable automatic Chrome updates to ensure timely patching of future vulnerabilities
  • Restrict access to untrusted websites through web filtering solutions
  • Deploy SentinelOne to detect and block exploitation attempts and post-exploitation activity

Patch Information

Google has released a security update addressing this vulnerability in Chrome version 146.0.7680.165. The patch resolves the integer overflow condition in the Fonts component, preventing out-of-bounds memory writes. Organizations should prioritize deployment of this update across all managed endpoints.

For detailed information about this security update, refer to the Google Chrome Desktop Update. Additional technical details may be available in the Chromium Issue Tracker Entry.

Workarounds

  • If immediate patching is not possible, consider temporarily using an alternative browser for high-risk browsing activities
  • Implement strict web content filtering to block access to unknown or untrusted domains
  • Enable Chrome's Site Isolation feature to limit the impact of renderer process compromises
  • Disable or restrict web fonts if operationally feasible using Chrome policies or enterprise configurations
bash
# Chrome Enterprise Policy Configuration
# Disable custom web fonts as a temporary mitigation
# Add to Chrome policy configuration file

# Windows Registry (HKLM\SOFTWARE\Policies\Google\Chrome)
# DefaultWebFontsSetting = 2

# Linux/macOS managed preferences
# Set DefaultWebFontsSetting to 2 to block web fonts

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.