Cyber Posture

CVE-2026-4439

High

Published: 20 March 2026

Published
20 March 2026
Modified
20 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0003 9.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4439 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Google Chrome. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 9.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Drive-by Compromise (T1189). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates identification, reporting, and timely remediation of critical flaws like the WebGL out-of-bounds memory access in Chrome prior to 146.0.7680.153 to prevent sandbox escape exploitation.

prevent

Implements memory protection safeguards such as ASLR, DEP, and stack canaries that directly counter out-of-bounds memory access vulnerabilities exploited via crafted HTML pages.

prevent

Enforces process isolation to strengthen browser sandboxing and limit the impact of potential escapes from WebGL memory corruption attacks.

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
Why these techniques?

Out-of-bounds memory corruption in Chrome WebGL enables remote code execution (with sandbox escape) when a user visits a crafted HTML page, directly mapping to Drive-by Compromise (T1189).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Out of bounds memory access in WebGL in Google Chrome on Android prior to 146.0.7680.153 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

Deeper analysisAI

CVE-2026-4439 is an out-of-bounds memory access vulnerability (CWE-125, CWE-787) in the WebGL component of Google Chrome on Android versions prior to 146.0.7680.153. Published on 2026-03-20, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is classified as Critical by Chromium security.

A remote attacker can exploit this issue by luring a user to interact with a crafted HTML page, requiring no privileges but necessitating user interaction such as loading the malicious content in a browser. Successful exploitation enables a potential sandbox escape, granting high-impact access to confidentiality, integrity, and availability within the affected browser context.

Google has released Chrome for Android version 146.0.7680.153 to patch this vulnerability. Security practitioners should prioritize updating affected devices. Additional details are available in the Chrome Releases stable channel update at https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html and the Chromium issue tracker at https://issues.chromium.org/issues/475877320.

Details

CWE(s)

Affected Products

google
chrome
≤ 146.0.7680.153

CVEs Like This One

CVE-2026-4459Same product: Apple Macos
CVE-2026-5913Same product: Apple Macos
CVE-2025-14766Same product: Apple Macos
CVE-2026-0899Same product: Apple Macos
CVE-2026-3061Same product: Apple Macos
CVE-2026-5873Same product: Apple Macos
CVE-2026-4440Same product: Apple Macos
CVE-2026-3920Same product: Apple Macos
CVE-2026-3062Same product: Apple Macos
CVE-2026-5282Same product: Apple Macos

References