Changeflow GovPing Data Privacy & Cybersecurity Chrome Vulnerabilities - Actively Exploited CVE...
Urgent Notice Added Final

Chrome Vulnerabilities - Actively Exploited CVE-2026-5281

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published April 1st, 2026
Detected April 1st, 2026
Email

Summary

CERT-FR issued advisory CERTFR-2026-AVI-0385 on 2026-04-01 detailing multiple vulnerabilities in Google Chrome affecting versions prior to 146.0.7680.177/178 on Linux, Windows, and Mac. CVE-2026-5281 is confirmed to be actively exploited. Google released the security patch on March 31, 2026. Users and organizations should update Chrome immediately to mitigate risk.

What changed

CERT-FR disclosed 21 vulnerabilities in Google Chrome spanning CVE-2026-5272 through CVE-2026-5292, with CVE-2026-5281 confirmed as actively exploited in the wild. Affected versions are Chrome for Linux and Windows prior to 146.0.7680.177, and Chrome for Mac prior to 146.0.7680.178. The exact nature of the exploit is unspecified by Google.

All organizations and individuals using Chrome on these platforms must update to version 146.0.7680.177 (Linux/Windows) or 146.0.7680.178 (Mac) immediately. IT administrators should verify Chrome installations across endpoints and ensure auto-updates are enabled. Chromium-based browsers (Edge, Brave, Opera) may share affected code and should also be patched. No specific compliance deadline is given, but the active exploitation status means immediate action is warranted.

What to do next

  1. Update Google Chrome to version 146.0.7680.177 or later for Linux and Windows
  2. Update Google Chrome to version 146.0.7680.178 or later for Mac
  3. Audit Chromium-based browsers (Edge, Brave, Opera) and patch to latest versions

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 01 avril 2026 N° CERTFR-2026-AVI-0385 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans Google Chrome

Gestion du document

| Référence | CERTFR-2026-AVI-0385 |
| Titre | Multiples vulnérabilités dans Google Chrome |
| Date de la première version | 01 avril 2026 |
| Date de la dernière version | 01 avril 2026 |
| Source(s) | Bulletin de sécurité Google Chrome du 31 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risque

  • Non spécifié par l'éditeur

Systèmes affectés

  • Chrome versions antérieures à 146.0.7680.177 pour Linux
  • Chrome versions antérieures à 146.0.7680.177 pour Windows
  • Chrome versions antérieures à 146.0.7680.178 pour Mac

Résumé

De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Google indique que la vulnérabilité CVE-2026-5281 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 01 avril 2026 Version initiale

Named provisions

Avis du CERT-FR Objet: Multiples vulnérabilités dans Google Chrome Systèmes affectés Risque Solutions Documentation

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
April 1st, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
CERTFR-2026-AVI-0385

Who this affects

Applies to
Technology companies Employers Government agencies
Industry sector
3341 Computer & Electronics Manufacturing 5112 Software & Technology 5182 Data Processing & Hosting
Activity scope
Software Vulnerability Management Browser Security Updates
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF NIST 800-53
Topics
Data Privacy Software Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.