Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome
Security WeekArchived Apr 01, 2026✓ Full text saved
Google has announced fixes for CVE-2026-5281, a zero-day affecting Chrome’s Dawn component. The post Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
Google has announced a Chrome 146 update that patches 21 vulnerabilities, including a zero-day that has been exploited in the wild.
According to an advisory from Google, the latest browser update fixes 19 high-severity and 2 medium-severity issues.
The exploited vulnerability is tracked as CVE-2026-5281, and it has been described as a use-after-free issue in Dawn, Chrome’s graphics layer.
“Google is aware that an exploit for CVE-2026-5281 exists in the wild,” Google said.
Google has not shared information on the attacks exploiting CVE-2026-5281. However, these types of vulnerabilities are often exploited for sandbox escapes or arbitrary code execution.
The company has credited an anonymous researcher for reporting the zero-day. The same researcher has also been credited for a different high-severity use-after-free issue in Dawn, but that flaw, tracked as CVE-2026-5284, does not appear to have been exploited in the wild.
This is the fourth Chrome zero-day patched this year, after CVE-2026-2441, CVE-2026-3909, and CVE-2026-3910.
All 21 vulnerabilities patched in the latest Chrome update were reported in March, and Google has yet to determine the bug bounties it will pay to the reporting researchers.
Related: Chrome 146 Update Patches High-Severity Vulnerabilities
Related: Google Plans Two-Week Release Schedule for Chrome
Related: Google Working Towards Quantum-Safe Chrome HTTPS Certificates
WRITTEN BY
Eduard Kovacs
Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption
Healthcare IT Platform CareCloud Probing Potential Data Breach
European Commission Reports Cyber Intrusion and Data Theft
FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers
CISA Flags Critical PTC Vulnerability That Had German Police Mobilized
Alleged RedLine Malware Administrator Extradited to US
Dell and HP Roll Out Quantum-Resistant Device Security
Russian Cybercriminal Gets 2-Year Prison Sentence in US
Latest News
Toy Giant Hasbro Hit by Cyberattack
New DeepLoad Malware Dropped in ClickFix Attacks
FBI Warns of Data Security Risks From China-Made Mobile Apps
US Charges Uranium Crypto Exchange Hacker
Webinar Today: Agentic AI vs. Identity’s Last Mile Problem
Axios NPM Package Breached in North Korean Supply Chain Attack
Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents
Censys Raises $70 Million for Internet Intelligence Platform
Trending
Webinar: Securing Fragile OT In An Exposed World
March 10, 2026
Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure.
Register
Webinar: Why Automated Pentesting Alone Is Not Enough
April 7, 2026
Join our live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline.
Register
People on the Move
Moderna has promoted Farzan Karimi to Deputy Chief Information Security Officer.
Brian Goldfarb has been appointed Chief Marketing Officer at SentinelOne.
Token has appointed Katy Nelson as Chief Revenue Officer.
More People On The Move
Expert Insights
The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust
Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin)
Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw
Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor)
The Human IOC: Why Security Professionals Struggle With Social Vetting
Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb)
How To 10x Your Vulnerability Management Program In The Agentic Era
The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation. (Nadir Izrael)
SIM Swaps Expose A Critical Flaw In Identity Security
SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts. (Torsten George)
Flipboard
Reddit
Whatsapp
Email