Google has released an urgent security update for its Chrome browser, addressing multiple critical vulnerabilities that could allow attackers to execute arbitrary code on affected systems. The update, rolled out under Chrome Stable Channel version 147.0.7727.137/138 for Windows and macOS and 147.0.7727.137 for Linux, fixes a total of 30 security flaws, including several high-risk memory corruption issues.

Among the most severe vulnerabilities are multiple “use-after-free” flaws that could enable remote code execution (RCE). These include CVE-2026-7363 in the Canvas component, CVE-2026-7361 affecting iOS builds, CVE-2026-7344 in Accessibility, and CVE-2026-7343 in Views. Such vulnerabilities occur when memory is improperly managed, allowing attackers to exploit freed memory and inject malicious code, potentially leading to full system compromise via specially crafted web pages.

In addition to these critical issues, the update addresses more than 20 high-severity vulnerabilities across key browser components, including GPU, WebRTC, ANGLE, Skia, and the V8 JavaScript engine. Notable examples include CVE-2026-7333 (use-after-free in GPU), CVE-2026-7353 (heap buffer overflow in Skia), CVE-2026-7354 (out-of-bounds read/write in ANGLE), and CVE-2026-7337 (type confusion in V8). These flaws can be chained together in sophisticated browser-based attacks.

While Google has not confirmed active exploitation in the wild, the nature of these vulnerabilities makes them highly attractive for threat actors. Attackers could leverage them in drive-by downloads, malicious advertising campaigns, or watering hole attacks to compromise unpatched systems.

To mitigate risks, Google has limited the release of detailed technical information until users have applied the patches. The vulnerabilities were identified by both internal teams and external researchers, using advanced tools such as AddressSanitizer, MemorySanitizer, libFuzzer, AFL, and Control Flow Integrity (CFI).

Security experts strongly recommend that users and organizations update Chrome immediately. Enterprises, in particular, are advised to prioritize patch management, monitor for unusual browser activity, and implement endpoint detection and response (EDR) solutions to reduce exposure.

Recommended Cyber Technology News :

To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com  



🔒 Login or Register to continue reading