PAN-SA-2026-0002 Chromium: Monthly Vulnerability Update (February 2026)
Exploit Maturity
UNREPORTED
Response Effort
MODERATE
Recovery
USER
Value Density
DIFFUSE
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Automatable
NO
User Interaction
NONE
Product Confidentiality
HIGH
Product Integrity
HIGH
Product Availability
HIGH
Privileges Required
NONE
Subsequent Confidentiality
NONE
Subsequent Integrity
NONE
Subsequent Availability
NONE
Description
Palo Alto Networks incorporated the following Chromium security fixes into our products:
- https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_27.html
- https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html
| CVE | Summary |
|---|---|
| CVE-2026-0899 | Out of bounds memory access in V8 |
| CVE-2026-0900 | Inappropriate implementation in V8 |
| CVE-2026-0901 | Inappropriate implementation in Blink |
| CVE-2026-0902 | Inappropriate implementation in V8 |
| CVE-2026-0903 | Inappropriate implementation in Downloads |
| CVE-2026-0904 | Incorrect security UI in Digital Credentials |
| CVE-2026-0905 | Insufficient policy enforcement in Network |
| CVE-2026-0906 | Incorrect security UI |
| CVE-2026-0907 | Incorrect security UI in Split View |
| CVE-2026-0908 | Use after free in ANGLE |
| CVE-2026-1504 | Inappropriate implementation in Background Fetch API |
| CVE-2026-1861 | Heap buffer overflow in libvpx |
| CVE-2026-1862 | Type Confusion in V8 |
Product Status
| Versions | Affected | Unaffected |
|---|---|---|
| Prisma Browser | < 144.27.7.133 | >= 144.27.7.133 |
Severity: HIGH, Suggested Urgency: MODERATE
CVSS-BT: 8.1 / CVSS-B: 9.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Solution
| CVE | Prisma Browser |
|---|---|
| CVE-2026-0899 | 144.6.10.59 |
| CVE-2026-0900 | 144.6.10.59 |
| CVE-2026-0901 | 144.6.10.59 |
| CVE-2026-0902 | 144.6.10.59 |
| CVE-2026-0903 | 144.6.10.59 |
| CVE-2026-0904 | 144.6.10.59 |
| CVE-2026-0905 | 144.6.10.59 |
| CVE-2026-0906 | 144.6.10.59 |
| CVE-2026-0907 | 144.6.10.59 |
| CVE-2026-0908 | 144.6.10.59 |
| CVE-2026-1504 | 144.23.6.110 |
| CVE-2026-1861 | 144.27.7.133 |
| CVE-2026-1862 | 144.27.7.133 |
Workarounds and Mitigations
No known workarounds exist for this issue.
CPE Applicability
- cpe:2.3:a:palo_alto_networks:prisma_browser:*:*:*:*:*:*:*:* is vulnerable from (including)144.27.7 and up to (excluding)144.27.7.133
Timeline
Initial Publication