Google Chrome Vulnerabilities Advisory
Summary
CERT-Bund has issued an advisory regarding multiple high-severity vulnerabilities in Google Chrome, with a CVSS base score of 8.8. The advisory, dated March 23, 2026, indicates that these vulnerabilities could allow remote attackers to execute code, cause denial-of-service, or expose information. Mitigation measures are available.
What changed
CERT-Bund has released advisory WID-SEC-2026-0837 detailing multiple critical vulnerabilities in Google Chrome versions prior to 146.0.7680.164. The vulnerabilities carry a CVSS base score of 8.8 and a temporal score of 7.7, both rated as high severity. Exploitation could lead to remote code execution, denial-of-service, information disclosure, and data manipulation across Linux, other UNIX systems, and Windows.
Organizations using affected versions of Google Chrome should update immediately to version 146.0.7680.164 or later to mitigate these risks. While the advisory indicates mitigation is available, prompt patching is the most effective defense against potential exploitation. Failure to update could expose systems to significant security threats, including unauthorized access and data compromise.
What to do next
- Update Google Chrome to version 146.0.7680.164 or later.
- Review system configurations for potential impact of disclosed vulnerabilities.
Archived snapshot
Mar 24, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-0837] Google Chrome: Mehrere Schwachstellen CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 23.03.2026 Stand 24.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Chrome ist ein Internet-Browser von Google.
Produkte
23.03.2026
- Google Chrome <146.0.7680.164
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Google Chrome ausnutzen, um nicht näher spezifizierte Angriffe durchzuführen, darunter möglicherweise Codeausführung, Denial-of-Service, Offenlegung von Informationen und Datenmanipulation. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.