Impact
The vulnerability is due to an inappropriate implementation in the V8 JavaScript engine within Google Chrome, which allows a remote attacker to trigger object corruption through a crafted HTML page. This flaw can lead to arbitrary code execution on the victim's machine if the user opens or views the malicious page. The underlying weakness is a memory corruption that impacts confidentiality, integrity, and availability by enabling the attacker to execute arbitrary code, potentially covering data theft, system compromise, or broader network propagation.
Affected Systems
All versions of Google Chrome before 144.0.7559.59 on any supported operating system—Windows, macOS, Linux, and others—are affected. The vulnerability resides in the V8 engine which is used across all installations of Chrome.
Risk and Exploitability
The vulnerability is rated high with a CVSS score of 8.8, indicating severe damage potential. The EPSS score is below 1%, suggesting few current exploitation attempts, and the issue is not listed in the CISA KEV catalog. Likely exploitation would require a remote attacker to host a malicious HTML page which the victim must visit or load, making social engineering or phishing a plausible attack vector. The likely attack vector is a remote HTML page that triggers the V8 corruption when rendered in the browser. This inference is drawn from the description that a crafted HTML page can exploit the flaw.
OpenCVE Enrichment
Debian DSA