Google Chrome GPU Out-of-Bounds Read: High-Severity Exploit Vector

Google Chrome GPU Out-of-Bounds Read: High-Severity Exploit Vector

The National Vulnerability Database has disclosed CVE-2026-9121, a high-severity out-of-bounds read vulnerability in the GPU component of Google Chrome. This flaw, affecting versions prior to 148.0.7778.179, allows a remote attacker to potentially trigger heap corruption through a specially crafted HTML page. The Chromium security team has rated its severity as Medium, but the CVSSv3.1 score is a critical 8.8, indicating a significant risk.

This vulnerability, categorized as CWE-125, poses a direct threat to user workstations and web browsing environments. An attacker leveraging this flaw could achieve arbitrary code execution or information disclosure, making it a prime candidate for drive-by downloads or watering hole attacks. The ‘UI:R’ (User Interaction: Required) in the CVSS vector means a user must visit a malicious page, but this is a low bar in today’s phishing-heavy landscape.

Defenders must prioritize patching Chrome immediately. This isn’t theoretical; browser vulnerabilities are a consistent entry point for attackers to gain initial access or escalate privileges. Organizations need robust patching policies and continuous monitoring to ensure all endpoints are running the latest, secure versions of their browsers. Assume attackers are already profiling this for exploit development.

What This Means For You

  • If your organization uses Google Chrome, you must ensure all installations are updated to version 148.0.7778.179 or later immediately. This vulnerability allows remote code execution via a malicious webpage, a common attack vector. Prioritize endpoint patching for all user workstations.

Indicators of Compromise

IDTypeIndicator
CVE-2026-9121 Memory Corruption Google Chrome prior to version 148.0.7778.179
CVE-2026-9121 Information Disclosure Out of bounds read in GPU
CVE-2026-9121 Heap Corruption Exploitable via crafted HTML page
🔎
Track Latest Browser Vulnerabilities Use /brief to get an analyst-ready weekly summary of high-severity vulnerabilities like this one.
Open Intel Bot →
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 20, 2026 at 23:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-45208: Apex One/SEP Agent Vulnerability Allows Local Privilege Escalation

CVE-2026-45208 — A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. Please note: an...

vulnerabilityCVEhigh-severitycwe-367
/SCW Vulnerability Desk /HIGH /7.8 /⚑ 3 IOCs

CVE-2026-45207: Apex One/SEP Agent Privilege Escalation

CVE-2026-45207 — An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar...

vulnerabilityCVEhigh-severitycwe-346
/SCW Vulnerability Desk /HIGH /7.8 /⚑ 3 IOCs

CVE-2026-45206: Privilege Escalation in Apex One/SEP Agent

CVE-2026-45206 — An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar...

vulnerabilityCVEhigh-severitycwe-346
/SCW Vulnerability Desk /HIGH /7.8 /⚑ 4 IOCs