Description
Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS prior to 148.0.7778.179 allowed a local attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: Medium)
Published: 2026-05-20
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The heap buffer overflow lies in the Chromecast part of Google Chrome on Android, Linux, and ChromeOS for versions older than 148.0.7778.179. A local attacker who can send specially crafted network traffic to Chrome’s Chromecast interface can trigger the overflow, resulting in the execution of arbitrary code inside Chrome’s sandboxed process. The flaw is classified as CWE‑122 and is listed by Chromium as a Medium‑severity issue.

Affected Systems

The affected product is Google Chrome running on Android, Linux, or ChromeOS before version 148.0.7778.179. Users on those platforms that have not upgraded are at risk.

Risk and Exploitability

The attack requires local access to the device and the ability to deliver malicious network traffic to the Chrome process. No publicly documented exploits exist, and the EPSS information is not available. The vulnerability is not included in CISA’s KEV catalog. The CVSS score of 7.5 indicates a high severity level. Because the breach occurs inside the Chrome sandbox, an attacker could potentially exploit the overflow to run code with the privileges granted to Chrome, making the risk moderate if a local attacker can reach the Chromecast interface.

Generated by OpenCVE AI on May 20, 2026 at 21:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chrome to version 148.0.7778.179 or newer to remove the heap overflow.
  • If an immediate upgrade is not possible, disable the Chromecast feature in Chrome or enforce the corresponding policy to block local discovery of network devices.
  • Apply network filtering rules that prevent unexpected local or network traffic from reaching the Chromecast service until a patch is installed.

Generated by OpenCVE AI on May 20, 2026 at 21:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 22:00:00 +0000

Type Values Removed Values Added
Title Local Heap Buffer Overflow in Chromecast Allows Code Execution

Wed, 20 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 20 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS prior to 148.0.7778.179 allowed a local attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: Medium)
Weaknesses CWE-122
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-20T19:32:25.067Z

Reserved: 2026-05-20T17:39:25.277Z

Link: CVE-2026-9123

cve-icon Vulnrichment

Updated: 2026-05-20T19:32:17.920Z

cve-icon NVD

Status : Received

Published: 2026-05-20T20:16:45.170

Modified: 2026-05-20T20:16:45.170

Link: CVE-2026-9123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T21:45:40Z

Weaknesses