Google issued emergency Chrome updates fixing two actively exploited zero-days. CVE-2026-3909 (Skia out-of-bounds write) and CVE-2026-3910 (V8 inappropriate implementation) are patched in versions 146.0.7680.75/76.
| IOC Type | Value | Description | Relevant MITRE ATT&CK Techniques |
|---|---|---|---|
| Vulnerability | CVE-2026-3909 | Out-of-bounds write weakness in Skia 2D graphics library allowing browser crash or code execution. | T1203|T1068 |
| Vulnerability | CVE-2026-3910 | Inappropriate implementation vulnerability in V8 JavaScript and WebAssembly engine. | T1203|T1068 |
| Code | Title |
|---|---|
| T1203 | Exploitation for Client Execution: Memory corruption in Skia and V8 leads to code execution. |
| T1068 | Exploitation for Privilege Escalation: Out-of-bounds write and implementation flaws allow privilege escalation. |
| Type | Value |
|---|---|
| Sector | Technology |
Google has released emergency security updates to patch two high-severity Chrome vulnerabilities exploited in zero-day attacks. "Google is aware that exploits for both
Last year, Google fixed a total of eight zero-days exploited in the wild , many of which were reported by Google's Threat Analysis Group (TAG), a group of security researchers known for tracking and identifying zero-days exploited in spyware attacks. On Thursday, Google also revealed that it has paid over $17 million to 747 security researchers who reported security flaws through its Vulnerability Reward Program (VRP) in 2025.