Out of Bounds Memory Access in Google Chrome due to WebAssembly Implementation
CVE-2026-3542

8.8HIGH

Key Information:

Vendor

Google

Status
Vendor
CVE Published:
4 March 2026

What is CVE-2026-3542?

CVE-2026-3542 is a high-severity vulnerability identified in Google Chrome, specifically linked to the improper implementation of WebAssembly. WebAssembly is a web standard that enables the execution of code written in various programming languages at near-native speed on web browsers. This vulnerability allows remote attackers to perform out of bounds memory access, which could lead to unauthorized data access or arbitrary code execution if exploited. As Google Chrome is widely used for browsing and accessing a multitude of online services, the presence of this vulnerability poses serious risks for organizations, particularly those relying heavily on web applications and services, potentially exposing sensitive information and compromising user security.

Potential impact of CVE-2026-3542

  1. Remote Code Execution: The vulnerability allows attackers to execute arbitrary code by manipulating the memory access, which can lead to complete control over affected systems. This can result in deploying malware or additional unauthorized tools within organizational networks.

  2. Data Breaches: Exploitation of this vulnerability could enable unauthorized access to sensitive data stored within the browser or accessible via web applications. This poses significant risks for organizations handling confidential information, risking legal and compliance ramifications.

  3. Increased Attack Surface: As one of the most heavily used web browsers, the exploitation of this vulnerability could have widespread repercussions, potentially affecting millions of users and introducing significant operational risks across various business workflows dependent on Chrome, which may also encourage further attacks exploiting similar weaknesses.

Affected Version(s)

Chrome 145.0.7632.159

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.