Threat Advisories:
New Report Critical Threat Research : The Iranian Cyber War Intensifies! Download the Report

Google Chrome CSS Use-After-Free Zero-Day Vulnerability (CVE-2026-2441)

Red | Vulnerability Report
Download PDF

Summary

A critical memory vulnerability tracked as CVE-2026-2441 is putting millions of Google Chrome browsers at risk, as attackers actively exploit a use-after-free weakness in the CSS engine of the Chromium-based browser ecosystem to silently compromise systems through malicious webpage visits. By abusing a CVE-2026-2441 use-after-free condition in Chrome’s CSS rendering engine, attackers can hijack browser behavior and execute malicious code with minimal user interaction, making routine web browsing a potential entry point for CVE-2026-2441 compromise. The CVE-2026-2441 vulnerability originates in the Chromium rendering engine powering browsers built on Chromium, and Google has confirmed that CVE-2026-2441 is being actively exploited in the wild, making immediate Google Chrome browser updates essential to stay protected from this critical zero-day. CVE-2026-2441 has been added to CISA’s Known Exploited Vulnerabilities catalog, confirming active exploitation of this Google Chrome CSS vulnerability since at least February 11, 2026. All versions of Google Chrome before patched releases (145.0.7632.75 on Windows/macOS and 144.0.7559.75 on Linux) remain vulnerable to CVE-2026-2441 exploitation, and other Chromium-based browsers including Microsoft Edge, Brave, Opera, and Vivaldi may also be impacted until vendors ship corresponding CVE-2026-2441 security updates.

Vulnerability Details

CVE-2026-2441 Use-After-Free Memory Safety Flaw in Chrome CSS Engine

CVE-2026-2441 is a use-after-free (UAF) flaw categorized under CWE-416, a class of memory safety issues that arise when software continues to use memory after it has already been released. This CVE-2026-2441 memory corruption can lead to unpredictable behavior, allowing attackers to manipulate application memory, crash Google Chrome, or execute malicious code. The CVE-2026-2441 weakness lies in the Chromium rendering engine’s CSS handling logic, with public analysis linking the CVE-2026-2441 issue to how CSS font feature values are processed in the Google Chrome browser.

CVE-2026-2441 Faulty Memory Management and Exploitation Technique

The CVE-2026-2441 vulnerability stems from faulty memory management within Google Chrome’s CSS processing logic, where an object is freed but still referenced through a lingering pointer. If that memory is later reused for another purpose, the stale reference in CVE-2026-2441 can access or manipulate unintended data. Attackers can exploit this CVE-2026-2441 condition to influence Google Chrome application behavior and potentially redirect execution flow. This CVE-2026-2441 pattern is a well-known exploitation technique that has repeatedly surfaced in modern browser engines like Chromium due to their complexity and performance-critical memory operations.

CVE-2026-2441 Drive-By Attack Exploitation via Malicious Webpages

In practice, CVE-2026-2441 exploitation typically occurs through drive-by attacks delivered via specially crafted web pages. CVE-2026-2441 victims only need to visit a malicious or compromised website or be redirected via phishing or malicious advertising for the exploit to trigger. Once the page loads, the browser’s CSS rendering pipeline processes the malicious content, activating the CVE-2026-2441 use-after-free condition and allowing attackers to execute code within the Google Chrome browser environment. No further action from the user is required beyond opening the page for CVE-2026-2441 exploitation to succeed.

CVE-2026-2441 Impact on Chromium-Based Browser Ecosystem

All versions of Google Chrome before the patched releases are vulnerable to CVE-2026-2441 across major platforms, and other browsers based on the Chromium engine, including products from Microsoft Edge, Brave Software, Opera, and Vivaldi Technologies, may also be impacted by CVE-2026-2441 until vendors ship corresponding security updates. The CVE-2026-2441 flaw originates in the open-source Chromium engine maintained by Chromium contributors, and Google has confirmed that CVE-2026-2441 vulnerability is already being exploited in real-world attacks, underscoring the urgency of applying available patches for CVE-2026-2441.

Recommendations

Update Google Chrome Immediately to Patch CVE-2026-2441

Organizations must apply the latest Google Chrome security patch by updating Chrome to version 145.0.7632.75 or later for Windows and macOS, and 144.0.7559.75 or later for Linux to protect against CVE-2026-2441. For organizations using the Extended Stable channel, update to version 144.0.7559.177 or later. Users should navigate to More > Help > About Google Chrome to trigger the CVE-2026-2441 update, and critically, must restart the browser after the update to ensure the patched binary protecting against CVE-2026-2441 is active.

Prioritize High-Risk Endpoints for CVE-2026-2441 Patch Deployment

Organizations must identify and prioritize patching for endpoints most likely to be targeted by CVE-2026-2441 exploitation, including systems used by executives, finance teams, IT administrators, SOC analysts, and other privileged users. These high-value targets are often the focus of sophisticated threat actors exploiting zero-day vulnerabilities like CVE-2026-2441, and their browsing patterns may increase exposure to drive-by attacks exploiting CVE-2026-2441 via spear-phishing links or watering hole campaigns.

Update All Chromium-Based Browsers to Address CVE-2026-2441

Ensure that all Chromium-based browsers deployed in the environment, including Microsoft Edge, Brave, Opera, and Vivaldi, are monitored for vendor-specific security updates that incorporate the upstream Chromium fix for CVE-2026-2441. Do not assume these browsers are patched simultaneously with Google Chrome against CVE-2026-2441, as each vendor has its own release cycle and integration timeline. Track vendor advisories for each Chromium-based browser and apply CVE-2026-2441 updates as they become available.

Implement Vulnerability Management for CVE-2026-2441 and Future Zero-Days

Maintain an up-to-date inventory of all browser versions deployed across the organization and establish automated patch compliance reporting for critical browser updates like CVE-2026-2441. Evaluate the security posture of all software that embeds the Chromium engine, including Electron-based applications, to assess broader exposure to CVE-2026-2441 and the underlying vulnerability. Implement a policy of regular vulnerability scanning and assessment to ensure timely identification and remediation of newly disclosed threats, particularly zero-day vulnerabilities like CVE-2026-2441 with confirmed in-the-wild exploitation.

MITRE ATT&CK TTPs

Initial Access (TA0001)
  • T1189: Drive-By Compromise – CVE-2026-2441 exploitation via malicious webpages
Execution (TA0002)
  • T1203: Exploitation for Client Execution – CVE-2026-2441 use-after-free exploitation
  • T1059: Command and Scripting Interpreter – Code execution in Chrome browser
Resource Development (TA0042)
  • T1588: Obtain Capabilities – Obtaining CVE-2026-2441 exploits
  • T1588.006: Vulnerabilities – Leveraging CVE-2026-2441 vulnerability

References

  • Google Chrome Releases: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox