Impact
This vulnerability is a stack buffer overflow that occurs in Chrome’s WebRTC implementation. A malicious, specially crafted web page can cause the browser to overwrite memory on the stack, potentially allowing the attacker to execute arbitrary code. The flaw is classified as a high severity issue by the Chromium security team, reflecting its ability to compromise the integrity and confidentiality of the system being attacked.
Affected Systems
The weakness is present in all releases of Google Chrome prior to version 146.0.7680.153. Users of the Chrome browser on any operating system—Windows, macOS, Linux, or other platforms—are at risk if they have not applied the most recent update that addresses the issue. No other software vendors or product lines are reported to be affected.
Risk and Exploitability
The CVSS score of 8.8 indicates a high potential impact if the flaw is successfully exploited. However, the EPSS score of less than 1% suggests that it is unlikely an attacker is actively exploiting this vulnerability in the wild at this time. The flaw is not listed in the CISA KEV catalog, which further indicates limited public exploitation. The typical attack requires a user to open a malicious HTML page in the browser, so social engineering or drive‑by download plays a key role in the exploit path. While the technical risk is high, the current exploit likelihood remains low.
OpenCVE Enrichment
Debian DSA