Palo Alto Networks Security Advisories / PAN-SA-2026-0002

PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026)

Urgency MODERATE

047910
Severity 8.1 · HIGH
Exploit Maturity UNREPORTED
Response Effort MODERATE
Recovery USER
Value Density DIFFUSE
Attack Vector NETWORK
Attack Complexity LOW
Attack Requirements NONE
Automatable NO
User Interaction NONE
Product Confidentiality HIGH
Product Integrity HIGH
Product Availability HIGH
Privileges Required NONE
Subsequent Confidentiality NONE
Subsequent Integrity NONE
Subsequent Availability NONE

Description

Palo Alto Networks incorporated the following Chromium security fixes into our products:

CVESummary
CVE-2026-0899Out of bounds memory access in V8
CVE-2026-0900Inappropriate implementation in V8
CVE-2026-0901Inappropriate implementation in Blink
CVE-2026-0902Inappropriate implementation in V8
CVE-2026-0903Inappropriate implementation in Downloads
CVE-2026-0904Incorrect security UI in Digital Credentials
CVE-2026-0905Insufficient policy enforcement in Network
CVE-2026-0906Incorrect security UI
CVE-2026-0907Incorrect security UI in Split View
CVE-2026-0908Use after free in ANGLE
CVE-2026-1504Inappropriate implementation in Background Fetch API
CVE-2026-1861Heap buffer overflow in libvpx
CVE-2026-1862Type Confusion in V8

Product Status

VersionsAffectedUnaffected
Prisma Browser< 144.27.7.133>= 144.27.7.133

Severity: HIGH, Suggested Urgency: MODERATE

CVSS-BT: 8.1 / CVSS-B: 9.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Solution

CVEPrisma Browser
CVE-2026-0899
144.6.10.59
CVE-2026-0900
144.6.10.59
CVE-2026-0901
144.6.10.59
CVE-2026-0902
144.6.10.59
CVE-2026-0903
144.6.10.59
CVE-2026-0904
144.6.10.59
CVE-2026-0905
144.6.10.59
CVE-2026-0906
144.6.10.59
CVE-2026-0907
144.6.10.59
CVE-2026-0908
144.6.10.59
CVE-2026-1504
144.23.6.110
CVE-2026-1861
144.27.7.133
CVE-2026-1862
144.27.7.133

Workarounds and Mitigations

No known workarounds exist for this issue.

CPE Applicability

Timeline

Initial Publication
© 2026 Palo Alto Networks, Inc. All rights reserved.