Google Releases Emergency Update for Two Actively Exploited Chrome Zero-Days (CVE-2026-3909, CVE-2026-3910)

Google Scrambles to Patch Two Actively Exploited Chrome Zero-Days Under Active Attack

CRITICAL
February 13, 2026
4m read
VulnerabilityPatch Management

Related Entities

Products & Tech

Google Chrome Microsoft EdgeBraveVivaldiSkiaV8

CVE Identifiers

CVE-2026-3909
HIGH
CVSS:8.8
CVE-2026-3910
HIGH
CVSS:8.8

Full Report

Executive Summary

On February 12, 2026, Google released an emergency security update for the Chrome web browser, patching two high-severity zero-day vulnerabilities that are under active exploitation. The vulnerabilities, tracked as CVE-2026-3909 and CVE-2026-3910, both carry a CVSS score of 8.8 and can lead to arbitrary code execution. The flaws reside in the Skia 2D graphics library and the V8 JavaScript engine, respectively. Given that Google has confirmed active exploits "in the wild," immediate patching is critical for all Chrome users and users of other Chromium-based browsers to prevent compromise.

Vulnerability Details

This emergency update addresses two distinct high-severity flaws:

  • CVE-2026-3909 (CVSS 8.8): This is an out-of-bounds write vulnerability in the Skia 2D graphics library. An attacker can craft a malicious HTML page that, when processed by the victim's browser, triggers a write outside the boundaries of an allocated memory buffer. This can lead to corruption of sensitive data, a crash, or arbitrary code execution within the context of the browser's sandboxed process.

  • CVE-2026-3910 (CVSS 8.8): This is an inappropriate implementation vulnerability in the V8 JavaScript and WebAssembly engine. This type of flaw typically arises from incorrect logic or faulty implementation of a feature, which an attacker can exploit via a specially crafted HTML page. Successful exploitation allows a remote attacker to execute arbitrary code within the V8 sandbox, which could potentially be chained with another vulnerability to escape the sandbox and compromise the underlying system.

Affected Systems

The vulnerabilities affect Google Chrome versions prior to the patched releases. Users should update immediately.

  • Google Chrome: Versions before 146.0.7680.75/76 for Windows and macOS, and 146.0.7680.75 for Linux.
  • Other Chromium-based Browsers: Users of browsers such as Microsoft Edge, Brave, and Vivaldi should monitor for and apply corresponding security updates from their respective vendors as they are released.

Exploitation Status

Google has explicitly stated, "is aware that exploits for both CVE-2026-3909 and CVE-2026-3910 exist in the wild." This confirms that threat actors are actively using these vulnerabilities in attacks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is expected to add both CVEs to its Known Exploited Vulnerabilities (KEV) catalog, mandating patching for federal agencies.

Impact Assessment

Successful exploitation of either vulnerability allows an attacker to execute arbitrary code on a victim's machine by tricking them into visiting a malicious website. While this code execution is initially contained within the browser's sandbox, attackers often chain such exploits with a sandbox escape vulnerability (T1068 - Exploitation for Privilege Escalation) to gain full control over the compromised system. This could lead to the installation of malware, ransomware, spyware, or the theft of sensitive information.

Detection Methods

  • Version Scanning: Use asset management or vulnerability scanning tools to identify all endpoints running vulnerable versions of Google Chrome or other Chromium-based browsers.
  • Endpoint Monitoring: Monitor for suspicious child processes spawned by browser processes (chrome.exe, msedge.exe). For example, a browser process spawning cmd.exe or powershell.exe is highly anomalous and warrants investigation. This aligns with D3FEND's Process Analysis (D3-PA).
  • Network Analysis: While difficult due to encryption, monitor for browser processes making network connections to known malicious domains or IP addresses. This aligns with D3FEND's Network Traffic Analysis (D3-NTA).

Remediation Steps

Immediate patching is the only effective remediation.

  1. Update Google Chrome: Navigate to chrome://settings/help in the browser to trigger the automatic update check and restart the browser to apply the patch.
  2. Update Other Browsers: For users of Microsoft Edge, Brave, Vivaldi, etc., check for updates within the browser's settings menu and apply them as soon as they are available.
  3. Enable Automatic Updates: Ensure that automatic updates are enabled for all web browsers to ensure timely patching against future zero-day vulnerabilities. This is a key component of D3FEND's Software Update (D3-SU).

Timeline of Events

1
February 10, 2026
Google's internal team discovers the two zero-day vulnerabilities.
2
February 12, 2026
Google releases an emergency patch for Chrome and confirms active exploitation.
3
February 13, 2026
This article was published

MITRE ATT&CK Mitigations

The primary mitigation is to apply the security updates provided by Google immediately.

Mapped D3FEND Techniques:

Modern browsers include exploit protections like sandboxing and ASLR. Ensure these features are enabled and not bypassed.

Mapped D3FEND Techniques:

Use web filtering to block access to known malicious or untrusted websites that could host exploit code.

Mapped D3FEND Techniques:

Timeline of Events

1
February 10, 2026

Google's internal team discovers the two zero-day vulnerabilities.

2
February 12, 2026

Google releases an emergency patch for Chrome and confirms active exploitation.

Sources & References

Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
The Hacker News (thehackernews.com) February 12, 2026
Known Exploited Vulnerabilities Catalog
CISA (cisa.gov) February 12, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Zero-DayGoogle ChromeVulnerabilityPatchingV8SkiaRCE

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.