Google fixes first actively exploited Chrome zero-day of 2026
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用特定的开头。首先,我需要仔细阅读文章内容。 文章讲的是Google修复了Chrome浏览器的一个零日漏洞CVE-2026-2441,这是一个高危的CSS用后释放错误,已经被活跃利用了。漏洞是在CSS组件中发现的,攻击者可以通过精心制作的HTML页面执行任意代码。安全研究员Shaheen Fazim在2月11日报告了这个漏洞,Google已经发布了紧急更新来修复这个问题。 接下来,我需要提取关键信息:Google修复了Chrome零日漏洞,编号是CVE-2026-2441,属于高危CSS用后释放错误,已被利用。研究员Shaheen Fazim发现并报告,Google已发布更新修复。 现在要控制在100字以内,并且直接描述内容。所以可以这样组织语言:“Google修复了Chrome浏览器中的高危零日漏洞CVE-2026-2441,该漏洞为CSS组件中的用后释放错误,已被活跃利用。安全研究员Shaheen Fazim发现并报告该漏洞,Google已发布紧急更新修复。” 这样既涵盖了主要信息,又符合字数要求。 </think> Google修复了Chrome浏览器中的高危零日漏洞CVE-2026-2441,该漏洞为CSS组件中的用后释放错误,已被活跃利用。安全研究员Shaheen Fazim发现并报告该漏洞,Google已发布紧急更新修复。 2026-2-16 10:10:46 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

Google fixes first actively exploited Chrome zero-day of 2026

Pierluigi Paganini February 16, 2026

Google patched Chrome zero-day CVE-2026-2441, a high-severity CSS use-after-free flaw actively exploited in the wild.

Google has released urgent security updates to address a high-severity zero-day vulnerability, tracked as CVE-2026-2441, in Chrome that is already being exploited in real-world attacks. The flaw is a use-after-free bug in the browser’s CSS component.

This is the first actively exploited Chrome zero-day fixed in 2026, after eight similar flaws were patched in 2025.

“Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.” reads the description of the vulnerability provided by NIST’s National Vulnerability Database (NVD).

An attacker could exploit the flaw to compromise affected systems. The issue was discovered and responsibly reported by security researcher Shaheen Fazim on February 11, 2026.

“CVE-2026-2441: Use after free in CSS. Reported by Shaheen Fazim on 2026-02-11.” reads the Google’s advisory. “Google is aware that an exploit for CVE-2026-2441 exists in the wild.”

Google has confirmed that an exploit for CVE-2026-2441 exists in the wild, but has not shared details about how it is being used or which threat actor is behind the exploitation of the flaw.

Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi should also install updates once available. Chrome’s Stable channel has been updated to versions 145.0.7632.75/76 for Windows and Mac, and 144.0.7559.75 for Linux, with the rollout happening over the coming days and weeks.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Chrome zero-day CVE-2026-2441)




文章来源: https://securityaffairs.com/188029/security/google-fixes-first-actively-exploited-chrome-zero-day-of-2026.html
如有侵权请联系:admin#unsafe.sh