Tech Bytes
Security

Chrome Zero-Day Emergency: Skia and V8 Under Active Attack

Dillip Chowdary

Mar 15, 2026

Google has issued its second emergency security update for Chrome in less than 48 hours, confirming that two high-severity zero-days are being actively exploited by state-sponsored threat actors.

The vulnerabilities, tracked as CVE-2026-3909 and CVE-2026-3910, target the core components of the browser's rendering and execution engines. This rapid-fire exploitation cycle highlights a significant escalation in the offensive capabilities of modern hacking groups, who are now capable of discovering and weaponizing multiple sandbox escapes within a single release branch.

CVE-2026-3909: The Skia Out-of-Bounds Write

The first flaw resides in Skia, the open-source 2D graphics library used across Chrome, Android, and Flutter. It is an "Out-of-Bounds Memory Write" vulnerability that occurs during the processing of specially crafted SVG filters. By manipulating the memory heap, an attacker can achieve Remote Code Execution (RCE) within the renderer process, allowing them to execute arbitrary commands with the same permissions as the browser tab.

CVE-2026-3910: V8 Sandbox Escape

The second, and more dangerous, vulnerability targets the V8 JavaScript engine. This flaw allows for a complete Sandbox Escape, enabling an attacker to break out of the renderer process and interact directly with the underlying operating system. Security researchers have observed this exploit being used in conjunction with CVE-2026-3909 to deliver persistent spyware to high-value targets via "drive-by download" attacks.

Indicators of Compromise (IoC):

  • Impacted Versions: Chrome 152.0.7423.108 and earlier
  • Attack Vector: Malicious HTML/SVG content
  • Mitigation: Update to version 153.0.7450.2 or higher immediately
  • Behavior: High CPU usage in single renderer processes followed by encrypted outbound traffic

Google's Fortnightly Pivot

In response to the unprecedented volume of zero-day discoveries in 2026, Google has announced a fundamental change to Chrome's release cycle. Starting with version 153, the stable branch will transition to a fortnightly update schedule. This move aims to reduce the "window of exposure" between the discovery of a bug and the deployment of a fix, acknowledging that the traditional monthly cycle is no longer sufficient for modern browser security.

Conclusion: Update Your Stack

CVE-2026-3909 and 3910 are reminders that the browser remains the primary entry point for sophisticated cyberattacks. Developers and IT administrators should ensure that Auto-Update is enabled across all corporate machines. For those in high-security environments, we recommend utilizing Application Guard or hardware-isolated browser instances until the current wave of exploits subsides.

Secure Your Organization

Join our security mailing list for real-time alerts on critical zero-days and emergency patches.