Google patched two actively exploited Chrome zero-days on March 13, 2026 — CVE-2026-3909 (out-of-bounds write in Skia, CVSS 8.8) and CVE-2026-3910 (inappropriate implementation in V8, CVSS 8.8) — both added to CISA’s KEV catalog the same day with a March 27 remediation deadline. These are the second and third Chrome zero-days weaponized in 2026, following CVE-2026-2441 in CSS, establishing a pattern of sustained, deliberate targeting across distinct Chrome subsystems. The attack surface extends to every Chromium-based browser in enterprise environments, making this a forced-update event, not a standard patch cycle item.
Three high-severity, actively exploited Chrome zero-days across three architecturally separate subsystems — CSS (CVE-2026-2441), Skia (CVE-2026-3909), and V8 (CVE-2026-3910) — in under three months is not coincidental. Each subsystem serves a different function: CSS handles styling and layout, Skia handles 2D graphics rendering, and V8 executes JavaScript and WebAssembly. Targeting all three independently suggests either a single well-resourced threat actor systematically probing Chrome’s attack surface or multiple actors independently treating Chrome as a high-value initial access vector. Either interpretation demands a strategic response, not just a patch deployment.
The delivery vector for both new vulnerabilities is a crafted HTML page requiring no user interaction beyond page load. CVE-2026-3909 exploits an out-of-bounds write in Skia, enabling memory access manipulation through rendered web content. CVE-2026-3910 exploits an inappropriate implementation flaw in V8, enabling arbitrary code execution within the Chrome sandbox. The sandbox containment of CVE-2026-3910 limits its standalone impact, but V8 sandbox escapes are a known and active attacker priority. When considered alongside CVE-2026-2441’s use-after-free primitive, chaining these vulnerabilities to achieve full system compromise is a credible threat model security teams must account for.
Google discovered both vulnerabilities internally on March 10, 2026 and shipped patches within three days — a fast turnaround that nonetheless left an active exploitation window. The internal discovery timeline suggests Google’s Threat Analysis Group (TAG) or telemetry-based detection identified in-the-wild activity rather than receiving an external researcher report. This distinction matters operationally: no public IOCs, no victim profile, and no attribution have been released, which is consistent with Google’s standard practice of limiting exploitation detail to reduce copycat activity. For security teams, this means signature-based detection will not work here. Behavioral detection is the only viable fallback during and after the patch window.
The Chromium-based browser ecosystem amplifies this exposure significantly. Microsoft Edge, Brave, Opera, and Vivaldi all share the underlying Chromium codebase and carry equivalent risk until their respective vendors ship downstream patches. Enterprise environments that inventory only Chrome are underestimating their exposed surface. Any organization running managed browser deployments should audit all Chromium-derived browsers immediately and treat vendor patch availability as a time-sensitive tracking item, not a passive wait.
CISA’s same-day KEV addition with a March 27, 2026 deadline applies formally to FCEB agencies, but the combination of CVSS 8.8 ratings, active exploitation, no-interaction delivery, and a broad Chromium attack surface makes this deadline a useful benchmark for all enterprises. The patched version threshold is Chrome 146.0.7680.75/76 on Windows and macOS, and 146.0.7680.75 on Linux. Organizations with extended patch cycles for browsers should treat any gap beyond the KEV deadline as an accepted and documented risk, not an oversight.
- Patch immediately: Update Chrome to 146.0.7680.75/76 (Windows/macOS) or 146.0.7680.75 (Linux). The CISA KEV deadline of March 27, 2026 is a floor — enterprise teams should aim to close this gap faster.
- Audit all Chromium-based browsers: Microsoft Edge, Brave, Opera, and Vivaldi carry equivalent exposure. Chrome-only patch tracking underestimates real surface area in most enterprise environments.
- Treat three zero-days across CSS, Skia, and V8 as a pattern signal: Elevate Chrome and Chromium vulnerability monitoring cadence and reduce browser patch SLA to match the demonstrated exploitation tempo.
- No public IOCs exist — shift to behavioral detection: Hunt for anomalous renderer process behavior, unexpected V8 JIT activity, and sandbox escape attempts in endpoint telemetry rather than relying on signature-based controls.
- Model V8 sandbox execution as a chaining primitive, not a containment: CVE-2026-3910’s in-sandbox code execution combined with prior Chrome primitives creates a credible full-compromise chain. Browser isolation controls raise attacker cost but do not eliminate risk.