On February 12, 2026, Google released an emergency security update for the Chrome web browser, patching two high-severity zero-day vulnerabilities that are under active exploitation. The vulnerabilities, tracked as CVE-2026-3909 and CVE-2026-3910, both carry a CVSS score of 8.8 and can lead to arbitrary code execution. The flaws reside in the Skia 2D graphics library and the V8 JavaScript engine, respectively. Given that Google has confirmed active exploits "in the wild," immediate patching is critical for all Chrome users and users of other Chromium-based browsers to prevent compromise.
This emergency update addresses two distinct high-severity flaws:
CVE-2026-3909 (CVSS 8.8): This is an out-of-bounds write vulnerability in the Skia 2D graphics library. An attacker can craft a malicious HTML page that, when processed by the victim's browser, triggers a write outside the boundaries of an allocated memory buffer. This can lead to corruption of sensitive data, a crash, or arbitrary code execution within the context of the browser's sandboxed process.
CVE-2026-3910 (CVSS 8.8): This is an inappropriate implementation vulnerability in the V8 JavaScript and WebAssembly engine. This type of flaw typically arises from incorrect logic or faulty implementation of a feature, which an attacker can exploit via a specially crafted HTML page. Successful exploitation allows a remote attacker to execute arbitrary code within the V8 sandbox, which could potentially be chained with another vulnerability to escape the sandbox and compromise the underlying system.
The vulnerabilities affect Google Chrome versions prior to the patched releases. Users should update immediately.
146.0.7680.75/76 for Windows and macOS, and 146.0.7680.75 for Linux.Google has explicitly stated, "is aware that exploits for both CVE-2026-3909 and CVE-2026-3910 exist in the wild." This confirms that threat actors are actively using these vulnerabilities in attacks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is expected to add both CVEs to its Known Exploited Vulnerabilities (KEV) catalog, mandating patching for federal agencies.
Successful exploitation of either vulnerability allows an attacker to execute arbitrary code on a victim's machine by tricking them into visiting a malicious website. While this code execution is initially contained within the browser's sandbox, attackers often chain such exploits with a sandbox escape vulnerability (T1068 - Exploitation for Privilege Escalation) to gain full control over the compromised system. This could lead to the installation of malware, ransomware, spyware, or the theft of sensitive information.
chrome.exe, msedge.exe). For example, a browser process spawning cmd.exe or powershell.exe is highly anomalous and warrants investigation. This aligns with D3FEND's Process Analysis (D3-PA).Immediate patching is the only effective remediation.
chrome://settings/help in the browser to trigger the automatic update check and restart the browser to apply the patch.The primary mitigation is to apply the security updates provided by Google immediately.
Mapped D3FEND Techniques:
Modern browsers include exploit protections like sandboxing and ASLR. Ensure these features are enabled and not bypassed.
Mapped D3FEND Techniques:
Use web filtering to block access to known malicious or untrusted websites that could host exploit code.
Mapped D3FEND Techniques:
Google's internal team discovers the two zero-day vulnerabilities.
Google releases an emergency patch for Chrome and confirms active exploitation.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.