Skip to content
Threat Feed
high advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)

CVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.

CVE-2026-7349 is a use-after-free vulnerability found in the Cast component of the Chromium browser engine. This vulnerability affects Google Chrome and, by extension, Microsoft Edge, as Edge is built upon Chromium. Use-after-free vulnerabilities can allow an attacker to execute arbitrary code or cause a denial-of-service. While the original report comes from Chrome, the nature of Chromium’s shared codebase means that other Chromium-based browsers are also vulnerable. Successful exploitation of this vulnerability could lead to code execution within the context of the browser process. Defenders need to prioritize patching and monitoring for unusual browser behavior.

Attack Chain

  1. An attacker crafts a malicious webpage designed to trigger the use-after-free vulnerability in the Cast component.
  2. The user visits the malicious webpage using a vulnerable version of Chrome or Edge.
  3. The Cast component attempts to access a freed memory location.
  4. The attacker exploits the use-after-free condition to corrupt memory.
  5. The attacker overwrites a function pointer or other critical data structure in memory.
  6. The attacker triggers the execution of the corrupted function pointer or data structure.
  7. The attacker gains arbitrary code execution within the context of the browser process.
  8. The attacker could potentially escalate privileges or perform other malicious activities, such as installing malware or stealing sensitive data.

Impact

Successful exploitation of CVE-2026-7349 could allow an attacker to execute arbitrary code within the context of the browser, potentially leading to data theft, malware installation, or further system compromise. Given the widespread use of Chrome and Edge, this vulnerability has a significant impact. The specific number of potential victims is dependent on the speed of patching, but could potentially affect millions of users.

Recommendation

  • Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7349.
  • Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.
  • Monitor browser process execution for unexpected code loading or memory access patterns using process creation logs.
  • Implement memory protection techniques such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate the impact of successful exploitation.

Detection coverage 2

Detect Suspicious Child Process of Chrome/Edge

high

Detects unusual child processes spawned by Chrome or Edge, which might indicate exploitation or malicious activity.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Detect Chrome/Edge Accessing Unusual Memory Regions

medium

Detects Chrome or Edge accessing memory regions outside its expected address space, possibly indicating a use-after-free or other memory corruption vulnerability.

sigma tactics: defense_evasion techniques: T1068 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →