
[CIVN-2026-0115] Multiple Vulnerabilities in Google ChromeOS / ChromeOS Flex
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Google ChromeOS / ChromeOS Flex
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Google ChromeOS version prior to 16552.47.0
Google ChromeOS Flex version prior to 16552.47.0
Overview
Multiple vulnerabilities have reported in Google ChromeOS and ChromeOS Flex which could allow a remote attacker to execute arbitrary code, bypass security restrictions, cause denial-of-service conditions, or obtain sensitive information on the targeted system.
Target Audience:
All organization and individual using Google ChromeOS or ChromeOS Flex systems.
Risk Assessment:
High risk of arbitrary code execution, privilege escalation, service disruption, system instability.
Impact Assessment:
Potential for remote code execution, sensitive data theft, or complete system compromise.
Description
ChromeOS is a lightweight operating system developed by Google for Chromebooks, optimized for secure web browsing and cloud-based computing. ChromeOS Flex extends this operating system to older PCs and Macs.
Multiple vulnerabilities exist in Google ChromeOS due to improper input validation, memory corruption, and insufficient security checks within system components and the underlying Chromium browser engine. An attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted web page.
Successful exploitation may result in arbitrary code execution, privilege escalation, disclosure of sensitive information, or denial-of-service conditions on the affected system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-chromeos_26.html
Vendor Information
Google Chrome
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-chromeos_26.html
References
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-chromeos_26.html
CVE Name
CVE-2025-38349
CVE-2025-0932
CVE-2025-21704
CVE-2026-2314
CVE-2026-2322
CVE-2026-2323
CVE-2026-2313
CVE-2026-2317
CVE-2026-2321
CVE-2026-2320
CVE-2026-2316
CVE-2026-2318
CVE-2026-2319
CVE-2026-2441
CVE-2025-2649
CVE-2026-2648
CVE-2026-2650
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=ihwm
—–END PGP SIGNATURE—–


