Description
Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Published: 2026-03-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Sandbox escape
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free vulnerability in the Dawn rendering engine of Google Chrome prior to version 146.0.7680.165 can be triggered by a remote attacker via a crafted HTML page, potentially breaking the browser's sandbox and allowing arbitrary code execution with system privileges. The weakness corresponds to CWE‑416 (Use‑After‑Free) and CWE‑825 (Unchecked Return Value). This flaw jeopardises confidentiality, integrity, and availability by permitting control over the host system.

Affected Systems

The defect was found in Google Chrome versions older than 146.0.7680.165 on all mainstream operating systems, including Windows, macOS, Linux, and Chrome OS. Consequently, any user running an outdated Chrome build on these platforms remains exposed.

Risk and Exploitability

The CVSS base score of 8.8 indicates high severity, while the EPSS score of less than 1% implies a low probability of active exploitation today. The vulnerability is not listed in the CISA KEV catalog, suggesting no current widespread exploitation. Based on the description, it is inferred that the attack vector requires a victim to load a malicious web page in Chrome; no additional privileges or network access are mentioned. Though the exploit conditions are simple, the high impact warrants swift mitigation.

Generated by OpenCVE AI on March 24, 2026 at 18:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 146.0.7680.165 or newer on all affected devices.

Generated by OpenCVE AI on March 24, 2026 at 18:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6177-1 chromium security update
History

Tue, 24 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Tue, 24 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: Use after free in Dawn
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Important


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-03-25T03:55:39.011Z

Reserved: 2026-03-23T21:08:17.768Z

Link: CVE-2026-4676

cve-icon Vulnrichment

Updated: 2026-03-24T00:51:59.612Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T01:17:03.217

Modified: 2026-03-24T16:50:03.117

Link: CVE-2026-4676

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-23T00:00:00Z

Links: CVE-2026-4676 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:38Z

Weaknesses