Chrome Zero-Days CVE-2026-3909, CVE-2026-3910 Hit CISA KEV
Google patches two actively exploited Chrome zero-days affecting Skia graphics and V8 JavaScript engine. CISA adds both to KEV catalog with March 27 deadline.
Google released emergency security updates on March 13 to patch two high-severity Chrome vulnerabilities that attackers were already exploiting in the wild. Within hours, CISA added both flaws to its Known Exploited Vulnerabilities catalog, requiring federal agencies to patch by March 27.
What Are These Vulnerabilities?
CVE-2026-3909 is an out-of-bounds write vulnerability in Skia, the 2D graphics library Chrome uses for rendering. An attacker can trigger memory corruption by tricking a user into visiting a malicious webpage. CVSS: 8.8.
CVE-2026-3910 involves an inappropriate implementation flaw in V8, Chrome's JavaScript and WebAssembly engine. Exploitation allows arbitrary code execution inside the browser sandbox. Also CVSS 8.8.
Both vulnerabilities were discovered by Google's internal security team on March 10, 2026—just three days before patches shipped. That's an unusually fast turnaround, suggesting Google observed active exploitation and prioritized accordingly.
How Attacks Work
The attack chain is straightforward: a victim visits an attacker-controlled page (or a legitimate site compromised with malicious ads), and the page delivers crafted HTML or JavaScript that triggers one of these flaws. Memory corruption in Skia or code execution in V8 follows.
Google hasn't disclosed attribution or specific campaigns, which is typical when exploitation is ongoing. The company stated only that "exploits for both CVE-2026-3909 and CVE-2026-3910 exist in the wild."
These mark the third and fourth Chrome zero-days patched in 2026. Back in February, we covered CVE-2026-2441, a use-after-free flaw that attackers similarly exploited before a fix was available. Chrome's complexity—V8 alone is millions of lines of C++—makes these flaws inevitable.
Affected Versions and Patch Status
Update immediately to:
- Windows/macOS: Chrome 146.0.7680.75 or 146.0.7680.76
- Linux: Chrome 146.0.7680.75
Chrome typically auto-updates, but you can force it via Settings > About Chrome. Restart required.
Because Chromium powers multiple browsers, Edge, Brave, Opera, and Vivaldi users should also update to their latest versions.
CISA's Response
CISA added both vulnerabilities to its KEV catalog on March 13, the same day Google released patches. Federal Civilian Executive Branch agencies must apply fixes by March 27, 2026—a 14-day window rather than the standard 21 days, reflecting the active exploitation status.
For organizations outside federal mandates, CISA's KEV additions serve as a prioritization signal. If CISA considers a flaw significant enough to track, your security team should too.
Recommended Actions
- Update Chrome immediately across all endpoints—don't wait for scheduled patching windows
- Verify Chromium-based browsers (Edge, Brave, Opera) are also current
- Check browser policies to ensure auto-updates aren't disabled by group policy
- Monitor for suspicious browser crashes that could indicate exploitation attempts
Why This Matters
Browser zero-days remain among the most valuable commodities in the exploit market. They require no user interaction beyond visiting a webpage, work across operating systems, and bypass most endpoint protections.
Google's three-day turnaround from discovery to patch demonstrates mature incident response, but the fact that attackers beat them to exploitation underscores a persistent challenge: sophisticated threat actors have access to zero-day research capabilities that rival major tech vendors. Organizations should treat browser updates with the same urgency as operating system patches—which, given the pace of Microsoft patches we've seen this month, is saying something.
For a broader view of current cybersecurity threats, these Chrome flaws fit a pattern of browser-based attack vectors gaining sophistication through 2026.
Related Articles
Google Patches Chrome Zero-Day Under Active Exploitation
CVE-2026-2441 is a high-severity CSS use-after-free in Chrome being exploited in the wild. Update to version 145.0.7632.75 immediately.
Feb 17, 2026CISA KEV Deadline Hits Today for Unpatched Gogs Zero-Day
CVE-2025-8110 allows authenticated attackers to achieve RCE on self-hosted Git servers via path traversal. Over 700 instances already compromised.
Feb 2, 2026CISA Adds n8n RCE Flaw to KEV as 24,700 Instances Sit Exposed
CVE-2025-68613 allows authenticated attackers to execute arbitrary code on n8n workflow servers. CISA gives federal agencies until March 25 to patch.
Mar 12, 2026Ivanti EPM Auth Bypass Now Under Active Exploitation, CISA Warns
CVE-2026-1603 allows unauthenticated attackers to steal credential vaults from Ivanti Endpoint Manager. CISA added it to KEV catalog after exploitation detected.
Mar 11, 2026