
[CIVN-2026-0116] Multiple Vulnerabilities in Google Chrome for Desktop
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Google Chrome for Desktop
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Google Chrome versions prior to 145.0.7632.116/117 for Windows
Google Chrome versions prior to 145.0.7632.116/117 for Mac
Google Chrome versions prior to 145.0.7632.116 for Linux
Overview
Multiple Vulnerabilities has been reported in Google Chrome for Desktop, which could be exploited by a remote attacker to execute arbitrary code, bypass security restrictions and sensitive information disclosure on the targeted system.
Target Audience:
All end user organizations and individuals using Google Chrome for Desktop (Windows, macOS and Linux platforms)
Risk Assessment:
High risk of Remote Code Execution (RCE)
Impact Assessment:
Potential for Information disclosure, data manipulation and security restriction bypass.
Description
Google Chrome is a popular internet browser that is used for accessing the information available on the World Wide Web. It is designed for use on Desktop computers such as those running on Windows, macOS or Linux operating systems.
Multiple Vulnerabilities exists in Google Chrome due to Out of bounds read in Media; Out-of-bounds Read and Write in Tint Component and Inappropriate Implementation in DevTools. A remote attacker could exploit these vulnerabilities by persuading a victim to visit specially crafted web page.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_23.html
Vendor Information
Google Chrome
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_23.html
References
Google Chrome
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_23.html
CVE Name
CVE-2026-3061
CVE-2026-3062
CVE-2026-3063
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmq3VsACgkQ3jCgcSdc
ys9pFA//c7n9nxkitL9ujPS7bC6qOInk45OONqdTemQnTC0/kbobWtlnyJaEMRRS
hgLoFaCRUIczU3/RfTQI0/EMyRx0SSw+Ef5SG0NpGae0spG2ppCYK+4AkwSVG2GB
2x5WSu2AFE3veLfpNQPdiF3Svf9Iibu6YtDXjxuiFeNA1zTJ/P+jZZxVY57b95lb
5/99vhJHrjjPSBylQPFBxZapiJelM8a7dv0YVtoZ8aQU6fiCcC8t96o1fD+HRKuH
mLQpiNuCyJfU862mKZy+dXGOwUeykRCAScYCYHvz9WGe0TMCBJM6tqxzCJRj5G1O
FzJpj4W8QW6p2zoDGCR1otsQ95RXC6SN7t04+AvQ79Hj9mzoN6YaCySUbon9GC8k
cn9eBs/zngelw8W31OiQ6LQh1uAWwAJ5iGZO46UaQH1fKM7arzzj1X7Bua9+rQ7A
SVihU4/Wrb+T974yfJaMXgGrIrciVnyIl+r+piGGnB0759i4JorBCwGt7T4YsyDf
wDnNsWNGCwVdn9KbYraD3NSv+zNWLb5VEOztbFIzYvhkFCLrA4ZaftaPcTCONYkJ
iLPbvMhHq2a1kV9+SKwjs/2lpnBHYvq4bc80DFxtLQfMSx922eOm9ljA7Ih1HbV4
fKAV9vHJ8Z/+gCarLlBck9Bcng3ckp/m4vZVhCI5/oRgGwGAhV4=
=o/tz
—–END PGP SIGNATURE—–


