CVE-2026-3909

Google Skia — Out-of-Bounds Write via Crafted HTML Page
⚠️ CVSS 3.1  8.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

Actively Exploited. This vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog on March 13, 2026 with a remediation deadline of March 27, 2026. Federal agencies are required to apply mitigations per BOD 22-01.

CVE-2026-3909 is an out-of-bounds write vulnerability in Skia, the open-source 2D graphics library used by Google Chrome and numerous other products. A remote attacker can exploit this flaw by luring a victim to a crafted HTML page, triggering out-of-bounds memory access in the Skia rendering engine. Successful exploitation can lead to arbitrary code execution in the context of the browser process.

Skia is a widely shared open-source component used across Google Chrome, ChromeOS, Android, Flutter, Mozilla Firefox, and many other applications. CISA's KEV listing explicitly notes: "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products." The blast radius extends well beyond Chrome alone.

Vulnerability Description

Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

Skia is an open-source 2D graphics library that serves as the primary rendering engine for Google Chrome, ChromeOS, Android, and Flutter. It handles operations such as rasterization, text rendering, path geometry, image decoding, and GPU-accelerated drawing.

The out-of-bounds write occurs when Skia processes specially crafted graphical content embedded in an HTML page. An attacker can craft a malicious web page that, when visited by a victim, triggers the OOB write during rendering. This can corrupt adjacent memory, potentially allowing the attacker to:

  • Execute arbitrary code in the context of the Chrome renderer process
  • Escape the renderer sandbox when combined with additional exploits
  • Achieve full system compromise in chained exploitation scenarios
  • Steal sensitive data from the victim's browsing session

The attack requires only that the victim navigate to a malicious page — no additional user interaction is needed beyond clicking a link. This makes it ideal for phishing campaigns, watering hole attacks, and malvertising.

Skia: Shared Open-Source Component

CISA's KEV entry includes an important note: this vulnerability affects a common open-source component used by different products. Skia is embedded in far more than just Google Chrome:

Products Using Skia

Google Chrome ChromeOS Android Flutter Mozilla Firefox (partial) Electron Apps LibreOffice Mono / .NET (SkiaSharp) Jetpack Compose
Broader Impact: Organizations should check with individual vendors for patching status. Any application that bundles Skia may be independently vulnerable, even if Chrome itself has been updated. Electron-based applications (VS Code, Slack, Discord, Teams, etc.) may require separate updates.

Affected Products & Versions

Google Chrome

PlatformVulnerable VersionsFixed Version
WindowsAll versions before 146.0.7680.80146.0.7680.80
macOSAll versions before 146.0.7680.80146.0.7680.80
LinuxAll versions before 146.0.7680.75146.0.7680.75

Other Affected Products

Chromium-based browsers (Microsoft Edge, Brave, Opera, Vivaldi, etc.) are also affected and require their own updates. Additionally, any software embedding Skia directly should be evaluated for this vulnerability. Check with specific vendors for patch availability.

Impact

Impact AreaDetail
ConfidentialityHigh — Attacker can read arbitrary memory in the renderer process
IntegrityHigh — Out-of-bounds write enables arbitrary code execution
AvailabilityHigh — Can crash the browser or renderer process
Attack VectorNetwork — victim must visit a crafted web page
Privileges RequiredNone — any remote attacker can host a malicious page
User InteractionRequired — victim must navigate to the attacker's page

Remediation

Immediate Actions

  1. Update Google Chrome to version 146.0.7680.80 or later (Windows/Mac) or 146.0.7680.75 or later (Linux)
  2. Update Chromium-based browsers — Microsoft Edge, Brave, Opera, Vivaldi, and others will release corresponding patches
  3. Update Electron-based applications — check for updates to apps built on Electron/Chromium
  4. Verify auto-update — navigate to chrome://settings/help to confirm Chrome is on the latest version
  5. Audit Skia usage — if your organization develops software using Skia or SkiaSharp, update the Skia dependency

Mitigations (if patching is delayed)

  • Enable Chrome's Site Isolation (enabled by default) to limit the impact of renderer exploits
  • Use browser security policies to restrict navigation to untrusted sites
  • Deploy web filtering to block known malicious domains
  • Consider disabling JavaScript on untrusted sites via browser extensions

Key Details

PropertyValue
CVE ID CVE-2026-3909
Vendor / Product Google — Skia
NVD Published2026-03-13
NVD Last Modified2026-03-25
CVSS 3.1 Score8.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
SeverityHIGH
CWE CWE-787
CISA KEV Added2026-03-13
CISA KEV Deadline2026-03-27
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2026-03-27. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2026-03-12CVE-2026-3909 published on NVD
2026-03-13Chrome stable channel update 146.0.7680.75 released with fix
2026-03-13Added to CISA Known Exploited Vulnerabilities catalog — confirms active exploitation
2026-03-25NVD last modified — NIST CVSS scoring finalized at 8.8 HIGH
2026-03-27CISA BOD 22-01 remediation deadline