Google Issues Emergency Patch for Two Actively Exploited Chrome Zero-Days

Google Patches High-Severity Zero-Days CVE-2026-3909 and CVE-2026-3910 Under Active Attack

CRITICAL
March 13, 2026
March 17, 2026
5m read
VulnerabilityPatch ManagementCyberattack

Related Entities(initial)

Organizations

Check PointGoogleMalwarebytes

Products & Tech

Google ChromeSkiaV8

CVE Identifiers

Full Report(when first published)

Executive Summary

On March 13, 2026, Google released an emergency security update for the Google Chrome desktop browser, addressing two high-severity zero-day vulnerabilities that are being actively exploited. The vulnerabilities, tracked as CVE-2026-3909 and CVE-2026-3910, pose a significant risk to users as they can be exploited by a remote attacker simply by tricking a victim into visiting a malicious website. The flaws reside in critical browser components: the Skia graphics library and the V8 JavaScript engine. Successful exploitation could lead to arbitrary code execution, creating a pathway for attackers to compromise the underlying system. Google has acknowledged reports that exploits for these CVEs exist in the wild and is urging all users to apply the update immediately.

Vulnerability Details

This emergency update addresses two distinct but equally critical vulnerabilities:

  • CVE-2026-3909: This is an out-of-bounds write vulnerability in Skia, the open-source 2D graphics library used by Chrome to render web content. An attacker can craft a malicious webpage that, when rendered, causes Skia to write data outside of its intended memory buffer. This memory corruption can be leveraged to crash the browser or, more critically, execute arbitrary code within the context of the browser's sandboxed renderer process. This vulnerability had been incorrectly reported as fixed earlier, necessitating this new, correct patch.

  • CVE-2026-3910: This flaw is categorized as an inappropriate implementation in the V8 JavaScript and WebAssembly engine. V8 is responsible for executing JavaScript on webpages. A remote attacker can create a specially crafted HTML page that exploits this flaw to execute arbitrary code within the V8 sandbox. While contained within the sandbox, such exploits are often the first stage of an attack chain.

Both vulnerabilities are dangerous because they process untrusted content from the web, making them prime targets. Attackers typically chain an exploit for a renderer vulnerability like these with a second exploit to escape the browser's sandbox and gain full control over the host machine.

Affected Systems

  • Product: Google Chrome Desktop Browser
  • Affected Versions: All versions prior to the patched release. Google has rolled out the fix in version 122.0.6261.128/.129 for Windows and 122.0.6261.128 for macOS and Linux.
  • Components: Skia 2D graphics library, V8 JavaScript engine.

Exploitation Status

Google has confirmed that exploits for both CVE-2026-3909 and CVE-2026-3910 exist and are being used in active attacks. The low complexity of the attack—requiring only that a user navigate to a malicious URL—makes widespread exploitation highly likely. These types of vulnerabilities are frequently used by state-sponsored actors and sophisticated cybercrime groups in targeted attacks and broad watering-hole campaigns.

Impact Assessment

The immediate impact of these vulnerabilities is the potential for remote code execution within the browser's sandboxed process. While the sandbox provides a layer of protection, it is not infallible. A determined attacker can chain this initial access with a separate sandbox escape vulnerability (T1068 - Exploitation for Privilege Escalation) to gain full system access. This could lead to the installation of malware, ransomware, spyware, or the theft of sensitive data such as passwords, financial information, and personal files stored on the victim's computer. Given Chrome's vast user base, the scale of potential impact is global, affecting individuals and enterprises alike.

Cyber Observables for Detection

Detecting exploitation of browser vulnerabilities can be challenging, but security teams can hunt for the following:

Type Value Description Context Confidence
process_name chrome.exe Monitor for chrome.exe processes spawning unusual child processes (e.g., cmd.exe, powershell.exe, wscript.exe). EDR logs, Windows Event ID 4688 high
network_traffic_pattern Unusual outbound connections from chrome.exe Look for connections to non-standard ports or IP addresses with low reputation scores originating from browser processes. NetFlow data, Firewall/Proxy logs medium
command_line_pattern chrome.exe --[suspicious-flag] Attackers may launch Chrome with specific flags to disable security features. Monitor for non-standard command-line arguments. EDR process creation logs low
event_id Windows application crash events A spike in Chrome browser crash events (Event ID 1000) could indicate failed exploitation attempts. Windows Application Event Log medium

Detection Methods

  • EDR/XDR Monitoring: Use an Endpoint Detection and Response solution to monitor browser process behavior. Create detection rules that alert on chrome.exe spawning command-line interpreters or writing executable files to disk.
  • Memory Analysis: In a suspected compromise, perform memory analysis of browser processes to look for signs of shellcode, ROP chains, or heap spraying, which are common exploitation techniques.
  • Network Analysis: Use D3FEND's D3-NTA - Network Traffic Analysis to identify C2 communications originating from workstations. Even if the initial exploit is hard to see, the subsequent C2 beaconing may be detectable.

Remediation Steps

  1. Immediate Update: The primary and most critical remediation step is to update Google Chrome to the latest patched version. Chrome's built-in updater will typically handle this automatically, but users should verify by navigating to Help > About Google Chrome. This is a direct implementation of D3FEND's D3-SU - Software Update.
  2. Restart the Browser: The update is not fully applied until the browser is restarted. Ensure all Chrome processes are terminated and the application is relaunched.
  3. Asset Inventory and Verification: Enterprises should use their asset management and vulnerability scanning tools to verify that all instances of Chrome on their networks have been successfully updated.
  4. Restrict Web Content (Compensating Control): In environments where immediate patching is not possible, use web filtering solutions to block access to untrusted or newly registered domains to reduce the likelihood of users visiting a malicious site. This aligns with MITRE mitigation M1021 - Restrict Web-Based Content.

Timeline of Events

1
March 13, 2026
Google releases an out-of-band security update for Chrome to patch two actively exploited zero-day vulnerabilities.
2
March 13, 2026
This article was published

Article Updates

March 17, 2026

Severity increased

Google released a new emergency patch for actively exploited Chrome zero-day CVE-2026-3909 after the previous fix was found to be insufficient, requiring users to update again.

Google has issued a new emergency security update for its Chrome desktop browser, specifically addressing CVE-2026-3909. This new patch was released on March 17, 2026, following an earlier communication error where Google had incorrectly stated that the vulnerability was already fixed. The flaw, a memory handling issue in the Skia 2D graphics library, remains actively exploited in the wild. Users who previously updated their browsers are urged to apply this latest patch immediately to ensure full protection against this critical zero-day vulnerability. The status of CVE-2026-3910 remains as previously reported, with its fix still effective.

Update Sources:
cybersecurity-review.comNews – March 2026

Sources & References(when first published)

16th March – Threat Intelligence Report
research.checkpoint.comMarch 16, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Google ChromePatch ManagementRemote Code ExecutionSkiaV8VulnerabilityZero-day

📢 Share This Article

Help others stay informed about cybersecurity threats