Integer Overflow Vulnerability in Google Chrome
CVE-2026-3536

8.8HIGH

Key Information:

Vendor

Google

Status
Vendor
CVE Published:
4 March 2026

What is CVE-2026-3536?

CVE-2026-3536 is a critical vulnerability in Google Chrome, specifically related to an integer overflow in the ANGLE component. Google Chrome is a widely used web browser that facilitates internet access and supports a variety of web applications, making it a key product for both individual users and organizations alike. The integer overflow vulnerability enables a remote attacker to potentially perform out-of-bounds memory access when users interact with specially crafted HTML pages. This can result in unauthorized memory access, which may lead to serious security breaches, including the execution of arbitrary code and exposure of sensitive data. For organizations utilizing Google Chrome for their web services and user interfaces, this vulnerability represents a significant risk that could undermine overall information security.

Potential impact of CVE-2026-3536

  1. Unauthorized Access: Exploitation of CVE-2026-3536 may grant attackers unauthorized access to sensitive system memory. This can compromise confidential user data, including personal information and corporate secrets.

  2. Remote Code Execution: The vulnerability could allow malicious actors to execute arbitrary code on affected systems. This ability can lead to full system compromise, where attackers can manipulate or control systems remotely, potentially deploying further malicious activities.

  3. Data Breaches: Given that Google Chrome is commonly used for accessing various web services, the exploitation of this vulnerability can result in significant data breaches. Compromised systems could facilitate the exfiltration of sensitive information, leading to not only financial loss but also reputational damage for the affected organizations.

Affected Version(s)

Chrome 145.0.7632.159

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.