The Indian Computer Emergency Response Team (CERT-In), India’s cybersecurity watchdog under the Ministry of Electronics and Information Technology, issued
a warning on Monday regarding the multiple vulnerabilities affecting desktop versions of Google Chrome. The authority cautioned users about the risk of remote attacks and the compromises in the systems. In this article, we explore how these vulnerabilities can be mitigated. CERT-In Issues High-Severity Warning For Chrome Users In a latest warning (CIVN-2026-0141) issued on March 16, 2026, the government body noted that several flaws exist in Chrome versions before 146.0.7680.80. These span across macOS, Windows, and Linux platforms. According to the government authority, these risks could allow remote attackers to execute arbitrary code on a targeted system. In simple words, these flaws can allow hackers to exploit systems and take control. Moreover, the agency highlighted that the risks stem from an out-of-bounds write flaw in Skia, Google Chrome’s graphics engine. CERT-In highlights that two vulnerabilities have been particularly concerning: CVE-2026-3909 and CVE-2026-3910. The authority stressed that these vulnerabilities are being exploited in the world. This raises urgency for organisations and individual users to act swiftly. Potential Threat To Systems CERT-In has warned that the potential exploitation may result in severe consequences, such as service disruptions, complete compromise of the system, and unauthorised access to sensitive data. Who Can Be Affected? These vulnerabilities are believed to impact all users who are running outdated versions of Google Chrome on their desktop systems. This could also include the enterprises. How To Protect Your System? The government body has advised users to update their Chrome browser to the latest version. It also highlighted that users must apply security patches to avoid and mitigate the risk. Amid the rising toll of cybersecurity attacks, a brief delay in updating the software can affect the systems and result in data compromise. Hence, it is crucial to take the necessary steps to protect your devices.













