[CIVN-2026-0115] Multiple Vulnerabilities in Google ChromeOS / ChromeOS Flex

By Published On: March 5, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Google ChromeOS / ChromeOS Flex


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Google ChromeOS version prior to 16552.47.0

Google ChromeOS Flex version prior to 16552.47.0

Overview


Multiple vulnerabilities have reported in Google ChromeOS and ChromeOS Flex which could allow a remote attacker to execute arbitrary code, bypass security restrictions, cause denial-of-service conditions, or obtain sensitive information on the targeted system.


Target Audience:

All organization and individual using Google ChromeOS or ChromeOS Flex systems.


Risk Assessment:

High risk of arbitrary code execution, privilege escalation, service disruption, system instability.


Impact Assessment:

Potential for remote code execution, sensitive data theft, or complete system compromise.


Description


ChromeOS is a lightweight operating system developed by Google for Chromebooks, optimized for secure web browsing and cloud-based computing. ChromeOS Flex extends this operating system to older PCs and Macs.


Multiple vulnerabilities exist in Google ChromeOS due to improper input validation, memory corruption, and insufficient security checks within system components and the underlying Chromium browser engine. An attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted web page.


Successful exploitation may result in arbitrary code execution, privilege escalation, disclosure of sensitive information, or denial-of-service conditions on the affected system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-chromeos_26.html



Vendor Information


Google Chrome

https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-chromeos_26.html


References


 

https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-chromeos_26.html


CVE Name

CVE-2025-38349

CVE-2025-0932

CVE-2025-21704

CVE-2026-2314

CVE-2026-2322

CVE-2026-2323

CVE-2026-2313

CVE-2026-2317

CVE-2026-2321

CVE-2026-2320

CVE-2026-2316

CVE-2026-2318

CVE-2026-2319

CVE-2026-2441

CVE-2025-2649

CVE-2026-2648

CVE-2026-2650




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmpmxIACgkQ3jCgcSdc

ys/GbQ/+LVFqUa7qdlNag0TUg3qNRM6l0h6dMUeDjP10xO280UzdiR01c8tA/5Dg

op2WkNu7ZQJoU5cj9DxV1GoxiLVktyecUoJM9UAS2BZpwMVY1LH5GHIzfSFyODEl

5zjWvGlgM8mVxvEIu/6XMP32FmZm5aemy9k39Yby/OqlKx4WJL4JbPU5KMEEUggy

SAj/YrFVIA2Ate50oArLV2Xd+kj6avZbjDp3suj11FLsPLy+wqq9CgHL1edjza/J

d9Lpjnu16/vv2P2L5n+mGR0ZQ//uD5lta1vBcO6yD0J6OfRBALYgJpRAfz6/bGz/

w2I9DPB7aZ4XKlbKdy2km9u4Kq3Mktd5/0jvvMOYwjrNdL9E4fy61LMyJouWpIPG

S6I7V8rKV1bGeP0JzDiTzhLQPJKrBcn5vzlwOch/MprQHY3CQ9MyFXpHJiih9A+X

lGg0PQVKl2vPL27zeBXmoskZs5/CAZ8SS2/TFk0KJTMJvNGRJirzCXsOyIEuoTu4

BAKJx5ExG18KplBA2Xs8UXEJvqk5KhGL76XSajvAho6B1civ5CeYLQ9NvPl86wct

vzJiyNV2YjiaaSYCelSeiC0/3RJz2jl3pS0HEeLJ2sa13ToPGgz6x5VWIMjRTH+e

nUpvW7pgAaAL1llYRgaQEpAr2CDH2WAZJ5iDc4EGXZ13kYBRMfg=

=ihwm

—–END PGP SIGNATURE—–

Share this article