Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Google Chrome Use-After-Free Zero-Day Under Active
Google Chrome Use-After-Free Zero-Day Under Active
SECURITYHIGHCVE-2026-2441

Google Chrome Use-After-Free Zero-Day Under Active

A high-severity use-after-free vulnerability in Chrome's CSS engine is being actively exploited in the wild. Google's first in-the-wild Chrome zero-day of...

Dylan H.

Security Team

February 16, 2026
3 min read

Affected Products

  • Google Chrome < 145.0.7632.75 (Windows/Mac)
  • Google Chrome < 144.0.7559.75 (Linux)

Executive Summary

Google has patched CVE-2026-2441, a high-severity use-after-free vulnerability in Chrome's CSS engine that is confirmed to be actively exploited in the wild. This is Chrome's first zero-day exploitation of 2026. The vulnerability allows remote attackers to execute arbitrary code inside the browser sandbox by tricking victims into visiting a crafted web page.

CVSS Score: 8.8 (High)

All Chrome users should update immediately to version 145.0.7632.75 or later.


Vulnerability Details

Root Cause

CVE-2026-2441 is a use-after-free (UAF) memory corruption bug in Chrome's CSS rendering component. The flaw occurs when:

  1. A CSS object is allocated and used during page rendering
  2. The object is freed (deallocated) during a specific rendering sequence
  3. The freed memory is subsequently referenced (used after free)
  4. An attacker can control what data occupies the freed memory

This pattern allows attackers to achieve arbitrary code execution within the Chrome renderer process.

Exploitation

VectorDetails
Attack VectorNetwork (remote)
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired (visit malicious page)
ScopeUnchanged
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh

Google confirmed: "An exploit for CVE-2026-2441 exists in the wild."

No details have been released on the threat actors, targets, or whether the exploit achieves sandbox escape.


Affected Versions

PlatformVulnerable VersionsFixed Version
WindowsChrome < 145.0.7632.75145.0.7632.75/.76
macOSChrome < 145.0.7632.75145.0.7632.75/.76
LinuxChrome < 144.0.7559.75144.0.7559.75

Chromium-based browsers (Edge, Brave, Opera, Vivaldi) may also be affected and should be updated when patches are available from their respective vendors.


Immediate Remediation

Update Chrome

  1. Navigate to chrome://settings/help
  2. Chrome will automatically download and install the update
  3. Click Relaunch to apply

Enterprise Deployment

# Force Chrome update check via Group Policy
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Google\Update" -Name "Update{8A69D345-D564-463C-AFF1-A69D9E530F96}" -Value 1
 
# Trigger update
& "C:\Program Files\Google\Update\GoogleUpdate.exe" /ua /installsource scheduler

If Patching Is Delayed

  1. Enable Site Isolation — Verify at chrome://flags/#enable-site-per-process
  2. Enable Enhanced Safe Browsing — Settings → Privacy → Security → Enhanced protection
  3. Restrict browsing to trusted and known-good websites
  4. Monitor for exploitation — Check for crashes or unexpected renderer process behavior

Detection

Crash Indicators

Chrome use-after-free exploitation often causes renderer crashes. Check:

  • Chrome crash reports: chrome://crashes
  • Windows Event Log: Application crashes for chrome.exe
  • Crash dump files in Chrome's user data directory

Network Indicators

Monitor for:

  • Visits to recently registered domains serving complex CSS
  • Large CSS payloads from untrusted sources
  • Unexpected renderer process spawning

Timeline

DateEvent
Feb 11, 2026Shaheen Fazim reports vulnerability to Google
Feb 13, 2026Google releases Chrome 145.0.7632.75/.76
Feb 16, 2026Google confirms in-the-wild exploitation

References

  • Google Chrome Releases Blog
  • The Hacker News — Chrome Zero-Day CVE-2026-2441
  • Help Net Security — Google Patches Chrome Vulnerability
  • SecurityWeek — Google Patches First Chrome Zero-Day of 2026
  • NIST NVD — CVE-2026-2441
#Google Chrome#Zero-Day#CVE-2026-2441#Use-After-Free#Active Exploitation#Browser

Related Articles

Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441

Google has patched CVE-2026-2441, a high-severity use-after-free vulnerability in Chrome's CSS component that has been actively exploited — the first...

4 min read

Windows SmartScreen Bypass Under Active Exploitation

Actively exploited Windows Shell vulnerability bypasses SmartScreen protection, allowing malicious files to execute without security warnings. Patch...

4 min read

CVE-2025-53521: F5 BIG-IP APM Remote Code Execution — CISA KEV (CVSS 9.8)

A critical unauthenticated RCE vulnerability in F5 BIG-IP APM is being actively exploited in the wild. Malicious traffic targeting access policy virtual servers triggers remote code execution. CISA has added this to the Known Exploited Vulnerabilities catalogue.

4 min read
Back to all Security Alerts