Back to CVE risk briefs

External risk intelligence

Google Chrome could allow external attackers to compromise devices via malicious websites

The Skia graphics library in Google Chrome, Android, and other platforms could allow external attackers to compromise devices via malicious websites. This vulnerability is being actively exploited, potentially exposing sensitive user data and impacting service availability.

NVD published March 13, 2026 (2 months ago)

External risk briefKnown Exploit

CVE-2026-3909

Halo Surface Signal

5/ 5

The vulnerability affects a web browser, a product explicitly designed to act as an interface to the public internet. Because the browser processes untrusted, externally-sourced content as its primary function, the attack surface is inherently exposed to the public internet in normal, everyday use.

Exposure facts

H – Horizon Alert

A security vulnerability has been identified in the Skia graphics library, which serves as a foundational component for Google Chrome and several other widely used software platforms. This flaw could allow an attacker to gain unauthorized access to system memory if a user is directed to a specially crafted web page. Given the ubiquity of this technology, this issue is significant as it creates a potential entry point for remote attackers through standard web browsing activity.

A – Asset Exposure

This vulnerability affects products integrated with the Skia graphics library, specifically Google Chrome, ChromeOS, Android, and the Flutter framework. Given their central role in web browsing and mobile application rendering, these technologies are frequently exposed to the public internet. If leveraged by external attackers via malicious web content, this issue could impact service availability or jeopardize the security of sensitive user data handled within these browser and application sessions.

L – Live Threat

This issue is included in the CISA Known Exploited Vulnerabilities catalog, which confirms that active exploitation has been observed. Remote attackers can leverage this vulnerability to gain unauthorized memory access by directing users to a crafted web page. Given this status, we are maintaining heightened awareness regarding the potential for impact.

O – Operational Fix

We recommend prioritizing an update for all Google Chrome installations to the latest release provided by the vendor to address this security risk. Please ensure that all affected systems, including cloud-based deployments, are updated in accordance with established vendor security guidance. If you are unable to apply these updates immediately, please review the available vendor mitigations for your specific environment to maintain operational security.

References