CVE-2026-0902

8.8 HIGH

📋 TL;DR

This vulnerability in Chrome's V8 JavaScript engine allows attackers to read memory outside intended boundaries via malicious web pages. It affects all Chrome users on vulnerable versions, potentially exposing sensitive data. The attack requires user interaction by visiting a crafted website.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 144.0.7559.59
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Extensions or security settings don't mitigate this.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data exfiltration, or installation of persistent malware.

🟠

Likely Case

Information disclosure through memory reading, potentially exposing session tokens, passwords, or other sensitive data in browser memory.

🟢

If Mitigated

Limited impact with proper sandboxing and exploit mitigations; browser crash or tab termination.

🌐 Internet-Facing: HIGH - Attackers can host malicious websites accessible to any internet user.
🏢 Internal Only: MEDIUM - Requires user to visit malicious internal sites or compromised legitimate sites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires JavaScript execution and memory manipulation knowledge. No public exploits known at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 144.0.7559.59 and later

Vendor Advisory: https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html

Restart Required: Yes

Instructions:

1. Open Chrome menu > Help > About Google Chrome. 2. Wait for update check. 3. Click 'Relaunch' when update downloads. 4. Verify version is 144.0.7559.59 or higher.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents exploitation by blocking JavaScript execution on untrusted sites

chrome://settings/content/javascript > Block

Use Site Isolation

all

Enforces process separation between websites to limit impact

chrome://flags/#site-isolation-trial-opt-out > Disabled

🧯 If You Can't Patch

  • Use alternative browsers until patching possible
  • Implement network filtering to block known malicious domains

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in menu > Help > About Google Chrome

Check Version:

On Windows: "chrome://version/" in address bar; On Linux: google-chrome --version; On macOS: /Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version

Verify Fix Applied:

Confirm version is 144.0.7559.59 or higher in About dialog

📡 Detection & Monitoring

Log Indicators:

  • Chrome crash reports with V8-related errors
  • Unexpected memory access patterns in system logs

Network Indicators:

  • Requests to domains hosting obfuscated JavaScript
  • Unusual outbound connections after visiting specific sites

SIEM Query:

source="chrome_logs" AND (error="V8" OR error="out_of_bounds") OR process="chrome" AND memory_access_violation

🔗 References

📤 Share & Export