Google Patches Three High-Severity Chrome Flaws

Google has fixed three high-severity Chrome flaws that could enable remote exploitation.

Written By
thumbnail
Ken Underhill
Ken Underhill
Feb 24, 2026
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Google has released a security update for its Chrome browser that addresses three high-severity vulnerabilities, which could pose risk to users.

One of the vulnerabilities, CVE-2026-3061, allows “… a remote attacker to perform an out-of-bounds memory read via a crafted HTML page,” said NIST in its advisory.

Inside the Chrome Vulnerabilities

The security update addresses three High severity vulnerabilities — CVE-2026-3061, CVE-2026-3062, and CVE-2026-3063 — spanning Chrome’s Media component, the Tint WebGPU shader compiler, and Chrome DevTools. 

Two of the three flaws involve out-of-bounds memory access, a vulnerability class commonly associated with remote code execution (RCE), memory disclosure, and sandbox escape chains when paired with additional weaknesses.

Advertisement

CVE-2026-3061

CVE-2026-3061 is an out-of-bounds read vulnerability in Chrome’s Media component. 

Out-of-bounds reads occur when software accesses memory outside the intended buffer, potentially exposing sensitive data or destabilizing the application. 

In a browser context, media processing is frequently exposed to untrusted input delivered through web pages, advertisements, or embedded content. 

An attacker could craft malicious media files designed to trigger the flaw when rendered by the browser, creating the potential for drive-by exploitation — where a user is compromised simply by visiting a malicious or compromised website. 

While an out-of-bounds read alone does not automatically grant code execution, it can leak memory contents or serve as a building block within a broader exploit chain.

Advertisement

CVE-2026-3062

This vulnerability affects Tint, Chrome’s WebGPU shader compiler, and involves both out-of-bounds read and out-of-bounds write conditions. 

Out-of-bounds writes can lead to memory corruption, potentially allowing attackers to manipulate program control flow. 

In practical terms, successful exploitation could enable arbitrary code execution within the browser’s renderer process. 

As WebGPU adoption increases to support high-performance graphics, AI workloads, and advanced browser-based applications, components like Tint expand Chrome’s attack surface. 

Graphics and shader compilers process complex instructions, and vulnerabilities in these pipelines can provide attackers with a powerful foothold inside the browser sandbox.

Advertisement

CVE-2026-3063

The third vulnerability, CVE-2026-3063, involves an inappropriate implementation in Chrome DevTools. 

Although implementation flaws in developer tooling may not carry the same immediate impact as memory corruption bugs, they can still introduce security risks. 

Under certain conditions, such weaknesses could enable cross-origin data exposure, privilege misuse, or bypasses of browser-enforced security controls. 

Given that DevTools interacts closely with page content and debugging interfaces, improper boundary enforcement can undermine core browser security assumptions.

At the time of publication, Google has not indicated that any of the three vulnerabilities are being actively exploited in the wild. 

Advertisement

Reduce Browser Security Risk

Modern browsers function as full-featured application platforms, which means they can present meaningful risk if vulnerabilities are left unaddressed. 

The following steps provide measures security teams can take to strengthen protections against browser-based threats.

  • Patch to the latest version of Chrome and validate updates were successful.
  • Harden browser configurations through enterprise policies by disabling unnecessary features (e.g., WebGPU where not required), restricting DevTools access, and enforcing extension allowlisting.
  • Monitor EDR and endpoint telemetry for unusual browser behavior, including abnormal child processes, renderer crashes, suspicious DLL loads, or unexpected GPU activity.
  • Enforce least privilege by removing local administrator rights, implementing just-in-time elevation, and limiting privileged access to hardened workstations.
  • Strengthen network defenses with DNS filtering, secure web gateways, outbound traffic monitoring, and egress controls to disrupt command-and-control activity.
  • Use segmentation and, where appropriate, remote browser isolation to reduce the blast radius of potential browser-based compromise.
  • Regularly test and update incident response plans and build playbooks around browser exploitation attempts.

Collectively, these measures help limit blast radius and build resilience against browser-based threats.

Advertisement

Browser Risk in the Enterprise

Although there is no evidence of active exploitation, the High severity ratings and underlying memory safety risks justify prioritization within enterprise risk management programs. 

For security teams, the browser is a key control layer, acting as the primary gateway to SaaS applications, cloud environments, and sensitive corporate data. 

As browser functionality continues to evolve — including support for AI-driven applications and GPU-accelerated workloads — maintaining strong patch governance and layered security controls will be essential to managing expanding attack surfaces.

These realities reinforce why organizations are adopting zero-trust solutions to better control access and contain risk at the browser and user level.

thumbnail
Ken Underhill

Ken Underhill is an award-winning cybersecurity professional, bestselling author, and seasoned IT professional. He holds a graduate degree in cybersecurity and information assurance from Western Governors University and brings years of hands-on experience to the field.

Recommended for you...

AI Agent Safety Checklist
Girish Redekar
Mar 12, 2026
Active Directory Flaw Enables SYSTEM Privilege Escalation
Ken Underhill
Mar 12, 2026
400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw
Ken Underhill
Mar 12, 2026
Iran-Linked Hacktivists Claim Wiper Attack on Stryker Systems
Ken Underhill
Mar 12, 2026
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.