Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441
Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441
SECURITYHIGHCVE-2026-2441

Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441

Google has patched CVE-2026-2441, a high-severity use-after-free vulnerability in Chrome's CSS component that has been actively exploited — the first...

Dylan H.

Security Team

February 20, 2026
4 min read

Affected Products

  • Google Chrome before 145.0.7632.75

Chrome's First 2026 Zero-Day

Google has released an emergency update for Chrome to address CVE-2026-2441, a high-severity use-after-free vulnerability in the browser's CSS handling component. The flaw has been actively exploited in the wild, making it the first Chrome zero-day that Google has patched in 2026.

Security researcher Shaheen Fazim discovered and reported the vulnerability on February 11, 2026. Google acknowledged that "an exploit for CVE-2026-2441 exists in the wild" and released a patch just two days later on February 13.


Vulnerability Details

AttributeValue
CVE IDCVE-2026-2441
CVSS Score8.8 (High)
TypeUse-After-Free (CWE-416)
ComponentChrome CSS Engine
Attack VectorNetwork (crafted HTML page)
User InteractionRequired (visit malicious page)
ExploitationActive — confirmed in the wild
DiscovererShaheen Fazim (Feb 11, 2026)
Patch DateFebruary 13, 2026

How the Exploit Works

Use-After-Free in CSS

A use-after-free vulnerability occurs when a program continues to reference memory after it has been freed. In Chrome's CSS engine:

  1. The CSS parser allocates memory for a style object
  2. Under specific conditions, the object is freed prematurely
  3. The freed memory is reallocated for attacker-controlled data
  4. Chrome's CSS engine references the now-attacker-controlled memory
  5. The attacker achieves arbitrary code execution within Chrome's sandbox

From Sandbox to System

While the initial exploit runs within Chrome's sandbox (a security boundary), it can be chained with:

  • Sandbox escape vulnerabilities to break out to the operating system
  • Privilege escalation bugs to gain elevated access
  • The current six Microsoft zero-days for full Windows system compromise

Patched Versions

PlatformPatched Version
WindowsChrome 145.0.7632.75/76
macOSChrome 145.0.7632.75/76
LinuxChrome 144.0.7559.75

How to Update

  1. Open Chrome and navigate to chrome://settings/help
  2. Chrome will check for updates and download automatically
  3. Click Relaunch to apply the update
  4. Verify the version number matches the patched version above

Impact Assessment

A successful exploit of CVE-2026-2441 enables:

Attack CapabilityDescription
Malware deliveryExecute arbitrary code to install malware
Credential theftAccess stored passwords, cookies, and session tokens
Session hijackingTake over authenticated sessions to banking, email, and other services
Cryptocurrency theftAccess browser-based crypto wallets
Lateral movementUse compromised browser as pivot point into corporate networks

Chrome Zero-Day Trend

Chrome zero-days continue to be a valuable commodity for both nation-state actors and commercial spyware vendors:

YearChrome Zero-Days PatchedNotable Exploits
202116Multiple chains used by commercial spyware
20229State-sponsored campaigns targeting journalists
20238Commercial spyware and APT campaigns
202410Increased targeting of enterprise Chrome deployments
202512Record year for Chrome zero-days
20261 (so far)CVE-2026-2441 — CSS use-after-free

Enterprise Considerations

For IT Administrators

  1. Force Chrome updates via Group Policy or enterprise management tools
  2. Monitor for outdated Chrome instances — Unpatched browsers are immediate targets
  3. Review browser isolation strategies — Consider remote browser isolation for high-risk users
  4. Enable Chrome's Enhanced Safe Browsing to get real-time protection against known exploit sites

For Security Teams

  1. Hunt for IOCs associated with CVE-2026-2441 exploitation
  2. Check proxy/web filter logs for connections to known exploit kit infrastructure
  3. Correlate with endpoint detection — Look for post-exploitation behavior following browser process anomalies
  4. Update WAF rules if protecting web applications from being weaponized as delivery vectors

Key Takeaways

  1. First Chrome zero-day of 2026 — CVE-2026-2441 is a use-after-free in the CSS engine (CVSS 8.8)
  2. Actively exploited — Google confirms in-the-wild exploitation
  3. Two-day patch turnaround — Disclosed Feb 11, patched Feb 13
  4. Update Chrome immediately — Version 145.0.7632.75/76 on Windows/Mac, 144.0.7559.75 on Linux
  5. Chainable with other vulnerabilities for full system compromise

Sources

  • The Hacker News — New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released
  • Malwarebytes — Update Chrome Now: Zero-Day Bug Allows Code Execution via Malicious Webpages
  • Help Net Security — Google Patches Chrome Vulnerability With In-the-Wild Exploit
  • SecurityWeek — Google Patches First Actively Exploited Chrome Zero-Day of 2026
#Google Chrome#Zero-Day#CVE-2026-2441#Browser Security#Use-After-Free

Related Articles

Google Chrome Use-After-Free Zero-Day Under Active

A high-severity use-after-free vulnerability in Chrome's CSS engine is being actively exploited in the wild. Google's first in-the-wild Chrome zero-day of...

3 min read

CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day

A maximum-severity authentication bypass in Cisco Catalyst SD-WAN (CVE-2026-20127, CVSS 10.0) has been actively exploited by threat actor UAT-8616 since...

4 min read

Cisco SD-WAN Zero-Day CVE-2026-20127 Triggers Five Eyes

A CVSS 10.0 authentication bypass in Cisco Catalyst SD-WAN has been exploited since at least 2023. CISA issues Emergency Directive ED 26-03 as all Five...

3 min read
Back to all Security Alerts