Integer Overflow Vulnerability in Google Chrome
CVE-2026-3538

8.8HIGH

Key Information:

Vendor

Google

Status
Vendor
CVE Published:
4 March 2026

What is CVE-2026-3538?

CVE-2026-3538 is a critical vulnerability found within Google Chrome, specifically related to an integer overflow issue in the Skia graphics library, which is integrated into the browser. The vulnerability, affecting versions prior to 145.0.7632.159, enables a remote attacker to execute out-of-bounds memory access through a crafted HTML page. This could lead to various negative consequences for organizations that rely on Chrome for web browsing and online activities, as the vulnerability could allow unauthorized access and manipulation of system resources without user intervention. Such risks underscore the necessity for users to maintain updated software to safeguard against potential exploits that take advantage of this flaw.

Potential impact of CVE-2026-3538

  1. Remote Code Execution: The most significant threat posed by this vulnerability is the potential for remote code execution, enabling attackers to run arbitrary code on affected systems. This could lead to severe breaches of security, resulting in unauthorized access to sensitive data and resources.

  2. Compromise of System Integrity: The exploitation of this vulnerability could allow adversaries to compromise the integrity of systems using vulnerable versions of the browser. This could result in the installation of malware, data manipulation, and other malicious activities that undermine organizational operations.

  3. Data Breaches: If exploited, this vulnerability raises the risk of data breaches wherein confidential or proprietary information could be accessed and exfiltrated by malicious actors. This jeopardizes not only the organization’s integrity but also poses regulatory compliance issues and potential reputational damage.

Affected Version(s)

Chrome 145.0.7632.159

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.