INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 2h Global ransomware Multiple sectors CRITICAL 2h Global malware Networking / Infrastructure CRITICAL 3h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 4h Global supply_chain Software Development and DevOps CRITICAL 5h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors HIGH 8h Global general Digital Content & Intellectual Property MEDIUM 8h Global malware Technology and Software Development CRITICAL 8h Global ddos Technology and Social Media HIGH 9h Global vulnerability Mobile Devices / Consumer Electronics HIGH 2h Global ransomware Multiple sectors CRITICAL 2h Global malware Networking / Infrastructure CRITICAL 3h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 4h Global supply_chain Software Development and DevOps CRITICAL 5h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors HIGH 8h Global general Digital Content & Intellectual Property MEDIUM 8h Global malware Technology and Software Development CRITICAL 8h Global ddos Technology and Social Media HIGH 9h Global vulnerability Mobile Devices / Consumer Electronics HIGH 2h Global ransomware Multiple sectors CRITICAL 2h Global malware Networking / Infrastructure CRITICAL 3h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 4h Global supply_chain Software Development and DevOps CRITICAL 5h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors HIGH 8h Global general Digital Content & Intellectual Property MEDIUM 8h Global malware Technology and Software Development CRITICAL 8h Global ddos Technology and Social Media HIGH 9h
Vulnerabilities

CVE-2026-2321

High
Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HT
CWE-416 — Weakness Type
Published: Feb 11, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🤖 AI Executive Summary

CVE-2026-2321 is a use-after-free vulnerability in Google Chrome's Ozone component affecting versions prior to 145.0.7632.45. An attacker can exploit heap corruption through a crafted HTML page combined with specific user UI gestures, potentially leading to arbitrary code execution. While no public exploit is available, the high CVSS score of 8.8 and remote attack vector make this a significant threat requiring immediate patching across Saudi organizations.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 16:36
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi banking sector (SAMA-regulated institutions), government agencies (NCA oversight), and critical infrastructure operators. Financial institutions using Chrome for customer-facing applications and internal operations face elevated risk of account compromise and data theft. Government entities and healthcare providers (MOH) are at risk of credential theft and sensitive data exfiltration. Telecom operators (STC, Mobily) and energy sector (ARAMCO, SEC) employees using Chrome for operational systems could enable lateral movement into critical infrastructure. The requirement for user interaction (UI gestures) slightly reduces risk but does not eliminate it given social engineering capabilities.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare and Medical Services Energy and Utilities Telecommunications Critical Infrastructure Education Retail and E-commerce
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Inventory all Chrome deployments across organization (enterprise, BYOD, kiosk systems)
2. Disable Chrome or restrict to trusted sites until patching is complete
3. Alert users to avoid clicking suspicious links or engaging with untrusted websites
4. Monitor for exploitation attempts targeting Chrome users

PATCHING GUIDANCE:
1. Update Google Chrome to version 145.0.7632.45 or later immediately
2. For enterprise deployments: Use Chrome Enterprise policies to force automatic updates
3. Verify patch deployment across all endpoints using MDM/EDR solutions
4. Prioritize patching for: financial services, government, healthcare, and critical infrastructure staff

COMPENSATING CONTROLS (if immediate patching not possible):
1. Implement browser isolation technology for high-risk users
2. Deploy Content Security Policy (CSP) headers on internal applications
3. Block execution of untrusted scripts via endpoint protection
4. Restrict Chrome usage to approved, monitored networks only
5. Disable JavaScript execution in Chrome for non-essential users

DETECTION RULES:
1. Monitor for Chrome process crashes with heap corruption indicators
2. Alert on Chrome version < 145.0.7632.45 in endpoint inventory
3. Detect suspicious HTML file downloads followed by Chrome execution
4. Monitor for abnormal Chrome child process spawning
5. Track failed Chrome update attempts and enforce compliance
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. حصر جميع نشرات Chrome عبر المنظمة (المؤسسي، BYOD، أنظمة الكشك)
2. تعطيل Chrome أو تقييد الوصول للمواقع الموثوقة فقط حتى اكتمال التصحيح
3. تنبيه المستخدمين لتجنب النقر على الروابط المريبة أو التفاعل مع المواقع غير الموثوقة
4. مراقبة محاولات الاستغلال الموجهة لمستخدمي Chrome

إرشادات التصحيح:
1. تحديث Google Chrome إلى الإصدار 145.0.7632.45 أو أحدث فوراً
2. للنشرات المؤسسية: استخدام سياسات Chrome Enterprise لفرض التحديثات التلقائية
3. التحقق من نشر التصحيح عبر جميع نقاط النهاية باستخدام حلول MDM/EDR
4. أولويات التصحيح: موظفو الخدمات المالية والحكومة والرعاية الصحية والبنية التحتية الحرجة

الضوابط البديلة (إذا لم يكن التصحيح الفوري ممكناً):
1. تنفيذ تكنولوجيا عزل المتصفح للمستخدمين عالي المخاطر
2. نشر رؤوس سياسة أمان المحتوى (CSP) على التطبيقات الداخلية
3. حظر تنفيذ البرامج النصية غير الموثوقة عبر حماية نقطة النهاية
4. تقييد استخدام Chrome للشبكات المعتمدة والمراقبة فقط
5. تعطيل تنفيذ JavaScript في Chrome للمستخدمين غير الأساسيين

قواعد الكشف:
1. مراقبة أعطال عملية Chrome مع مؤشرات تلف الذاكرة
2. التنبيه على إصدار Chrome < 145.0.7632.45 في جرد نقطة النهاية
3. كشف تنزيلات ملفات HTML المريبة متبوعة بتنفيذ Chrome
4. مراقبة توليد عملية فرعية غير طبيعي في Chrome
5. تتبع محاولات تحديث Chrome الفاشلة وفرض الامتثال
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Information security policies and procedures ECC 2024 A.5.2.1 - Access control and user management ECC 2024 A.6.2.1 - Vulnerability management and patching ECC 2024 A.6.2.2 - Security testing and assessment ECC 2024 A.7.1.1 - Incident detection and response
🔵 SAMA CSF
SAMA CSF ID.RA-1 - Asset management and inventory SAMA CSF ID.RA-2 - Threat and vulnerability identification SAMA CSF PR.IP-12 - Software development and security practices SAMA CSF DE.CM-1 - Detection processes and tools SAMA CSF RS.RP-1 - Response planning and procedures
🟡 ISO 27001:2022
ISO 27001:2022 A.5.1 - Policies for information security ISO 27001:2022 A.8.1 - Asset management ISO 27001:2022 A.8.2 - Data classification and handling ISO 27001:2022 A.12.6 - Change management ISO 27001:2022 A.14.2 - Software development security
🟣 PCI DSS v4.0
PCI DSS 2.4 - Maintain inventory of system components PCI DSS 6.2 - Ensure security patches are installed PCI DSS 11.2 - Perform vulnerability scans regularly PCI DSS 12.2 - Implement configuration standards
📦 Affected Products / CPE 1 entries
google:chrome
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionR — Required
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-416
EPSS0.12%
Exploit No
Patch ✓ Yes
Published 2026-02-11
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-416
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.