VulnerabilitiesCRITICAL

Google Chrome Zero-Day - Critical Vulnerability Fixed, Active Exploitation Confirmed

Featured image for Google Chrome Zero-Day - Critical Vulnerability Fixed, Active Exploitation Confirmed
HNHelp Net Security+1 more
CVE-2026-5281Google ChromeWebGPUDawnMicrosoft EdgeChromeZero-DayVulnerabilitySecurity Update
๐ŸŽฏ

Google found a serious flaw in its Chrome browser that hackers are already using to break in. They've fixed it quickly, but you need to update your browser to stay safe. This update also fixes a bunch of other problems, so it's important to do it right away.

Quick Summary

Google has patched a critical zero-day vulnerability in Chrome that is actively exploited, along with 20 other security fixes.

Google has fixed 21 vulnerabilities affecting its popular Chrome browser, including a critical zero-day vulnerability (CVE-2026-5281) that is currently being actively exploited in the wild. This vulnerability is a use-after-free (UAF) flaw in Dawn, Chrome's cross-platform GPU abstraction layer used for implementing WebGPU. According to Google, the exploit allows a remote attacker to execute arbitrary code via a specially crafted HTML page. The update has been rolled out to the Stable channel, bringing Chrome versions to 146.0.7680.177/178 for Windows and Mac, and 146.0.7680.177 for Linux. Google confirmed that it is aware of active exploitation of CVE-2026-5281, which was reported by an anonymous researcher on March 10, 2026. Details about the exploit remain limited to prevent further replication until a majority of users have installed the patch.

In addition to this zero-day, the update addresses 20 other vulnerabilities, with 19 rated as High severity. Notable vulnerabilities include various use-after-free bugs across different Chrome subsystems such as CSS, WebGL, and WebCodecs, highlighting ongoing memory safety challenges in browser rendering pipelines. The concentration of use-after-free vulnerabilities suggests significant internal security activity, with some vulnerabilities reportedly identified by Google's internal security teams. Users are urged to update their browsers immediately, either through manual updates or by restarting the browser if auto-updating is enabled.

Given the confirmed exploitation of CVE-2026-5281, organizations should prioritize this update to mitigate potential risks. The large number of vulnerabilities patched in this release indicates a proactive approach to security, emphasizing the importance of regular updates.

Original article from

HNHelp Net Securityยท Zeljka Zorz
Read Full Article

Also covered by

CYCyber Security News

New Chrome Zero-Day Vulnerability Actively Exploited in Attacks โ€” Patch Now

Read Article

Related Pings

CRITICALVulnerabilities

Chrome Zero-Day Vulnerability - Critical Patch Released Now

A new zero-day vulnerability in Chrome is being actively exploited. Google has released a critical patch for all users. Update your browser now to protect against attacks.

Cyber Security Newsยท
CRITICALVulnerabilities

WebLogic RCE Vulnerability - Hackers Exploit Critical Flaw

A critical vulnerability in Oracle WebLogic Server is being actively exploited by hackers. This flaw allows attackers to execute arbitrary code, posing significant risks. Organizations must patch their systems immediately to prevent exploitation.

Cyber Security Newsยท
CRITICALVulnerabilities

Chrome Zero-Day CVE-2026-5281 Under Active Exploitation

A critical zero-day vulnerability in Chrome has been exploited. Users must update to the latest version to protect against potential attacks. This flaw could allow attackers to execute arbitrary code remotely.

The Hacker Newsยท
HIGHVulnerabilities

Google Chrome Security Advisory - Critical Vulnerability Alert

Google has issued a security advisory for Chrome, warning users of a critical vulnerability. An exploit is already in the wild, affecting many users. Immediate updates are necessary to safeguard against potential attacks.

Canadian Cyber Centre Alertsยท
MEDIUMVulnerabilities

Dormant Devices - Uncovering Security Risks in Enterprises

Dormant devices can be a hidden security threat for enterprises. Forgotten notebooks may hold sensitive data, risking unauthorized access. It's crucial for IT teams to address these overlooked endpoints.

Dark Readingยท
HIGHVulnerabilities

Mutation Testing Uncovers High-Severity Arkis Vulnerability

A critical vulnerability in the Arkis protocol was uncovered through mutation testing, exposing potential risks for users. New tools MuTON and mewt aim to enhance software testing efficiency and security. Developers are urged to adopt these tools to prevent future vulnerabilities.

Trail of Bits Blogยท