CVE-2026-3924Use After Free in Google Chrome

CWE-416Use After Free9 documents9 sources
Severity
7.5HIGHNVD
EPSS
0.1%
top 67.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 11
Latest updateMar 24

Description

use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages3 packages

CVEListV5google/chrome146.0.7680.71146.0.7680.71
NVDgoogle/chrome< 146.0.7680.71
Debianchromium/chromium< 146.0.7680.71-1~deb12u1+2

🔴Vulnerability Details

3
GHSA
GHSA-89j4-4h3p-qx8x: use after free in WindowDialog in Google Chrome prior to 1462026-03-12
OSV
CVE-2026-3924: use after free in WindowDialog in Google Chrome prior to 1462026-03-11
CVEList
CVE-2026-3924: use after free in WindowDialog in Google Chrome prior to 1462026-03-11

📋Vendor Advisories

4
Chrome
Stable Channel Update for ChromeOS / ChromeOS Flex: CVE-2026-39242026-03-24
Red Hat
chromium-browser: Use after free in WindowDialog2026-03-10
Microsoft
Chromium: CVE-2026-3924 Use after free in WindowDialog2026-03-10
Debian
CVE-2026-3924: chromium - use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-3924 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-3924 — Use After Free in Google Chrome | cvebase