High (8.8)

Chrome Vulnerability (CVE-2026-3539)

CVE-2026-3539

Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a craft...

Affected: Google Chrome

Overview

A high-severity vulnerability has been identified in Google Chrome’s Developer Tools (DevTools). This flaw involves an object lifecycle management error, which could allow a malicious actor to corrupt the browser’s memory (heap corruption) under specific conditions.

Vulnerability Explained Simply

Think of the browser’s memory as a carefully organized workspace. Chrome’s DevTools feature helps developers manage objects (pieces of data and code) in this space, ensuring they are created and deleted properly. This vulnerability is a bug in that cleanup process. If a user installs a specially crafted malicious browser extension, it could trick DevTools into improperly handling these objects. This mistake corrupts the organized memory workspace, potentially allowing the attacker to take control of that part of the browser.

Potential Impact

If successfully exploited, this heap corruption could enable an attacker to execute arbitrary code on the victim’s machine within the context of the Chrome browser. In practice, this means an attacker could:

  • Steal sensitive data (passwords, cookies, session tokens) from the browser.
  • Install malware or other unwanted software on the system.
  • Perform actions on behalf of the logged-in user.

Crucial Note: Exploitation requires the user to be tricked into installing a malicious extension from the Chrome Web Store or another source. The attack cannot be triggered by simply visiting a website.

Remediation and Mitigation

The primary solution is to update the browser immediately.

1. Immediate Action: Update Chrome Google has released a fix in version 145.0.7632.159 and later. To update:

  • Click the three vertical dots in Chrome’s top-right corner.
  • Navigate to Help > About Google Chrome.
  • The browser will automatically check for and install the update. A restart is required.

2. Enterprise Management For IT administrators managing deployments via Google Chrome Enterprise or policies:

  • Ensure your update channels are pushing version 145.0.7632.159 or higher.
  • Consider temporarily increasing update priority for this release due to its high severity.

3. Important Mitigation Advice

  • Extension Vigilance: Reinforce policies and user training regarding browser extensions. Users should only install extensions from trusted publishers on the official Chrome Web Store. Review and audit installed extensions, especially those with broad permissions.
  • Principle of Least Privilege: Maintain standard user accounts for daily work, not administrative accounts, to limit the potential impact of any successful exploit.

All users and organizations should apply the update as soon as possible to eliminate this risk.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Google Vulnerabilities

View all Google vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.