Google Chrome: High-Severity QUIC Vulnerability Allows Remote Code Execution

Google Chrome: High-Severity QUIC Vulnerability Allows Remote Code Execution

A critical use-after-free vulnerability, identified as CVE-2026-9114, has been reported in Google Chrome’s QUIC implementation. According to the National Vulnerability Database, this flaw affects versions prior to 148.0.7778.179. It enables a remote attacker to execute arbitrary code within the browser’s sandbox through specially crafted network traffic.

The National Vulnerability Database assigns this vulnerability a CVSSv3.1 score of 8.8 (High), underscoring the severe risk it poses. The attack vector is network-based, requiring user interaction (UI:R), which typically means a user must visit a malicious site or interact with malicious content. However, the impact on confidentiality, integrity, and availability is rated as high, indicating a significant compromise if exploited.

For defenders, this is a clear signal to prioritize browser updates. The attacker’s calculus here is straightforward: exploit a common, widely used application to gain an initial foothold. A successful exploit could lead to arbitrary code execution, bypassing the browser’s sandbox and potentially escalating privileges or deploying further malware. Proactive patching is the only robust defense against such client-side vulnerabilities.

What This Means For You

  • If your organization uses Google Chrome, you must ensure all installations are updated to version 148.0.7778.179 or later immediately. This is not a future problem; it's an active threat that allows remote code execution. Prioritize patching across your entire fleet to mitigate the risk of attackers exploiting this use-after-free vulnerability.

Related ATT&CK Techniques

🛡️ Detection Rules

5 rules · 6 SIEM formats

5 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-9114

Sigma YAML — free preview
title: Web Application Exploitation Attempt — CVE-2026-9114
id: scw-2026-05-20-1
status: experimental
level: high
description: |
  Detects common exploitation patterns targeting web applications. Review CVE-2026-9114 advisories for specific indicators.
author: SCW Feed Engine (auto-generated)
date: 2026-05-20
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-9114/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri-query|contains:
        - '..'
        - 'SELECT'
        - 'UNION'
        - '<script'
        - 'cmd='
        - '/etc/passwd'
      condition: selection
falsepositives:
  - Legitimate activity from CVE-2026-9114

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-9114 Use After Free Google Chrome prior to version 148.0.7778.179
CVE-2026-9114 RCE QUIC component in Google Chrome
CVE-2026-9114 Memory Corruption Use after free vulnerability
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 20, 2026 at 23:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-4811 — Cross-Site Scripting (XSS)

CVE-2026-4811 — The WPB Floating Menu & Categories for WordPress – Sticky Side Menu with Icons plugin for WordPress is vulnerable to Stored Cross-Site Scripting...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /MEDIUM /4.9 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-1881 — The Broadstreet plugin for WordPress is vulnerable to

CVE-2026-1881 — The Broadstreet plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.52.2 via the get_sponsored_meta...

vulnerabilityCVEmedium-severitycwe-639
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-9149 — Libsolv Buffer Overflow

CVE-2026-9149 — A flaw was found in libsolv. This heap buffer overflow vulnerability occurs when a victim processes a specially crafted `.solv` file containing negative...

vulnerabilityCVEmedium-severitybuffer-overflowcwe-122
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma