CVE-2026-3536
Published: 04 March 2026
Summary
CVE-2026-3536 is a high-severity External Control of Assumed-Immutable Web Parameter (CWE-472) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 27.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of critical flaws like the integer overflow in Chrome's ANGLE component via vendor patches to version 145.0.7632.159 or later.
Enables scanning and monitoring for known vulnerabilities such as CVE-2026-3536 in Chrome installations to identify exploitable systems before attacker exploitation.
Provides memory protection mechanisms to restrict unauthorized out-of-bounds memory access resulting from the integer overflow in ANGLE triggered by crafted HTML.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Integer overflow in Chrome ANGLE enables RCE via crafted HTML on malicious site (drive-by), directly mapping to T1189 (Drive-by Compromise) and T1203 (Exploitation for Client Execution).
NVD Description
Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)
Deeper analysisAI
CVE-2026-3536 is an integer overflow vulnerability (CWE-190) in the ANGLE graphics component of Google Chrome prior to version 145.0.7632.159. The flaw enables a remote attacker to potentially perform out-of-bounds memory access via a crafted HTML page, as reported on March 4, 2026. Chromium rates it as Critical severity with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), also linked to CWE-472.
A remote attacker without privileges can exploit this by luring users to visit a malicious site hosting the crafted HTML page, requiring user interaction such as clicking a link. Low attack complexity enables broad potential reach. Exploitation could grant high-impact confidentiality, integrity, and availability compromises, including out-of-bounds memory access that may lead to code execution or system crashes.
Mitigation is available via the Google Chrome stable channel update to version 145.0.7632.159 or later, as announced in the Chrome Releases blog at chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html. Additional details on the fix are documented in the Chromium issue tracker at issues.chromium.org/issues/485622239. Security practitioners should prioritize updating affected Chrome installations.
Details
- CWE(s)