Tech Bytes
Security

Chrome Zero-Day Emergency: Skia and V8 Under Active Attack

Dillip Chowdary

Mar 15, 2026

Google has issued its second emergency security update for Chrome in less than 48 hours, confirming that two high-severity zero-days are being actively exploited by state-sponsored threat actors.

The vulnerabilities, tracked as **CVE-2026-3909** and **CVE-2026-3910**, target the core components of the browser's rendering and execution engines. This rapid-fire exploitation cycle highlights a significant escalation in the offensive capabilities of modern hacking groups, who are now capable of discovering and weaponizing multiple sandbox escapes within a single release branch.

CVE-2026-3909: The Skia Out-of-Bounds Write

The first flaw resides in **Skia**, the open-source 2D graphics library used across Chrome, Android, and Flutter. It is an "Out-of-Bounds Memory Write" vulnerability that occurs during the processing of specially crafted SVG filters. By manipulating the memory heap, an attacker can achieve **Remote Code Execution (RCE)** within the renderer process, allowing them to execute arbitrary commands with the same permissions as the browser tab.

CVE-2026-3910: V8 Sandbox Escape

The second, and more dangerous, vulnerability targets the **V8 JavaScript engine**. This flaw allows for a complete **Sandbox Escape**, enabling an attacker to break out of the renderer process and interact directly with the underlying operating system. Security researchers have observed this exploit being used in conjunction with CVE-2026-3909 to deliver persistent spyware to high-value targets via "drive-by download" attacks.

Indicators of Compromise (IoC):

  • Impacted Versions: Chrome 152.0.7423.108 and earlier
  • Attack Vector: Malicious HTML/SVG content
  • Mitigation: Update to version 153.0.7450.2 or higher immediately
  • Behavior: High CPU usage in single renderer processes followed by encrypted outbound traffic

Google's Fortnightly Pivot

In response to the unprecedented volume of zero-day discoveries in 2026, Google has announced a fundamental change to Chrome's release cycle. Starting with version 153, the stable branch will transition to a **fortnightly update schedule**. This move aims to reduce the "window of exposure" between the discovery of a bug and the deployment of a fix, acknowledging that the traditional monthly cycle is no longer sufficient for modern browser security.

Conclusion: Update Your Stack

CVE-2026-3909 and 3910 are reminders that the browser remains the primary entry point for sophisticated cyberattacks. Developers and IT administrators should ensure that **Auto-Update** is enabled across all corporate machines. For those in high-security environments, we recommend utilizing **Application Guard** or hardware-isolated browser instances until the current wave of exploits subsides.

Secure Your Organization

Join our security mailing list for real-time alerts on critical zero-days and emergency patches.