Site icon TheCyberThrone

CISA Adds Two Google Chrome Zero-Days to KEV

Advertisements

CISA has updated its Known Exploited Vulnerabilities (KEV) catalog with two newly confirmed zero-days affecting Google Chrome — CVE-2026-3909 and CVE-2026-3910. Both vulnerabilities are confirmed exploited in the wild, and Google has acknowledged active exploitation without disclosing attribution or attack details at this stage.

CVE-2026-3909 — Out-of-Bounds Write in Skia

This vulnerability resides in Skia, the open-source 2D graphics library embedded in Chrome and a wide array of other software including Android applications and Flutter-based apps. An out-of-bounds write flaw allows a remote attacker to perform out-of-bounds memory access via a specially crafted HTML page — no privileges or user interaction required beyond visiting a malicious page.

The critical concern here extends beyond browsers. Any software embedding the Skia library that has not yet received the corresponding patch remains in scope. Security teams must audit their asset inventory for Skia-dependent software beyond just Chrome.

CVE-2026-3910 — Inappropriate Implementation in V8

This vulnerability affects V8, Chrome’s JavaScript and WebAssembly execution engine. An inappropriate implementation flaw allows a remote attacker to execute arbitrary code within the Chrome sandbox via a crafted HTML page. V8 vulnerabilities are particularly high-value in exploit development because they offer a remote code execution path with nothing more than a webpage as the delivery mechanism — making them ideal for malvertising, phishing, and watering hole campaigns.

When both CISA and Google confirm active exploitation of a V8 bug, it means a working exploit chain is already in use by threat actors in the real world.

Discovery & Patch Status

Both vulnerabilities were reported internally by Google on March 10, 2026. The stable channel has been updated to version 146.0.7680.75/76 for Windows and Mac, and 146.0.7680.75 for Linux. Microsoft followed with Edge version 126.0.2592.68 on March 12, 2026, covering Chromium-based exposure in enterprise environments.

CISA Remediation Deadline

Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are mandated to remediate both vulnerabilities by March 27, 2026. While BOD 22-01 applies directly to federal agencies, CISA strongly urges all organizations to prioritize KEV-listed vulnerabilities for immediate remediation.

What Organizations Should Do Now

Chrome zero-days confirmed in KEV require incident-response velocity — not patch-cycle velocity.

Stay tuned to TheCyberThrone for continued KEV tracking and vulnerability intelligence.

Exit mobile version