Description
Inappropriate implementation in Media in Google Chrome on iOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In Google Chrome on iOS, an improper handling of media data allowed a remote attacker who had already taken over the renderer process to read data outside of allocated memory when loading a crafted HTML page. The vulnerability is a classic out‑of‑bounds read, classified as CWE‑693. The potential impact is information disclosure from the attacker’s perspective, with no confirmed escalation to higher privileges or code execution. Chrome’s own security team rates the severity as Medium, indicating a notable but limited risk if the preconditions are met.

Affected Systems

Chrome for iOS versions prior to 148.0.7778.168 are affected. No additional vendor or product information is listed.

Risk and Exploitability

Exploitation requires the attacker to have already compromised the renderer process, a serious prerequisite that limits the attack surface. Because the EPSS score is < 1%, the likelihood of widespread exploitation is uncertain, and the vulnerability is not yet listed in the CISA KEV catalog. The CVSS score of 7.5 and the medium Chromium security rating suggest that while the flaw is not trivially exploitable, it should be treated with caution, especially in environments where renderer processes could be exposed to untrusted content.

Generated by OpenCVE AI on May 15, 2026 at 17:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome on iOS to version 148.0.7778.168 or later, which removes the improper media handling logic.
  • Configure the browser or device policy to avoid loading untrusted HTML content that could trigger media processing in the renderer process.
  • If an update cannot be applied immediately, isolate the renderer process by restricting its network and file system access to reduce the risk of an attacker succeeding after compromising it.

Generated by OpenCVE AI on May 15, 2026 at 17:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 18:00:00 +0000

Type Values Removed Values Added
Title Out-of-Bounds Memory Read in Google Chrome iOS Media Handling

Fri, 15 May 2026 16:15:00 +0000

Type Values Removed Values Added
Title Out‑of‑Bounds Read in Chrome iOS Media Renderer
Weaknesses CWE-119

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 May 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Out‑of‑Bounds Read in Chrome iOS Media Renderer
Weaknesses CWE-119

Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Inappropriate implementation in Media in Google Chrome on iOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T13:41:00.790Z

Reserved: 2026-05-14T05:40:27.970Z

Link: CVE-2026-8585

cve-icon Vulnrichment

Updated: 2026-05-15T13:39:36.332Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-14T20:17:20.900

Modified: 2026-05-15T15:16:56.310

Link: CVE-2026-8585

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T17:45:04Z

Weaknesses