Google threat watch

Google product CVE coverage — Chrome, Android, cloud services, and platform component vulnerabilities.

Vendor watch hub

What this page covers

The Googlewatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Google activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

112

Active

87

Featured

99

Unique CVEs

20

Most recent entry

Apr 1, 2026, 12:16 AM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Google watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

chrome vulnerability (CVE-2026-5883)

HIGH
watchNVDCVE-2026-5883

Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

Apr 8, 2026, 5:16 PMOfficial source

chrome vulnerability (CVE-2026-5281)

HIGH
activeCISA KEVCVE-2026-5281

Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

Apr 1, 2026, 12:16 AMOfficial source

clasp vulnerability (CVE-2026-4092)

HIGH
watchNVDCVE-2026-4092

Path Traversal in Clasp impacting versions < 3.2.0 allows a remote attacker to perform remote code execution via a malicious Google Apps Script project containing specially crafted filenames with directory traversal sequences.

Mar 13, 2026, 2:55 PMOfficial source

Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability

critical
activeCISA KEVCVE-2026-3910

Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Mar 12, 2026, 7:00 PMOfficial source

Google Skia Out-of-Bounds Write Vulnerability

critical
activeCISA KEVCVE-2026-3909

Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.

Mar 12, 2026, 7:00 PMOfficial source

web designer vulnerability (CVE-2026-3223)

HIGH
watchNVDCVE-2026-3223

Arbitrary file write & potential privilege escalation exploiting zip slip vulnerability in Google Web Designer.

Feb 27, 2026, 8:16 AMOfficial source

Google Chromium CSS Use-After-Free Vulnerability

critical
activeCISA KEVCVE-2026-2441

Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Feb 16, 2026, 6:00 PMOfficial source

protobuf vulnerability (CVE-2026-0994)

HIGH
watchNVDCVE-2026-0994

A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages. Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.

Jan 23, 2026, 9:16 AMOfficial source

Google Chromium Out of Bounds Memory Access Vulnerability

critical
activeCISA KEVCVE-2025-14174

Google Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Dec 11, 2025, 6:00 PMOfficial source

Android Framework Privilege Escalation Vulnerability

critical
activeCISA KEVCVE-2025-48572

Android Framework contains an unspecified vulnerability that allows for privilege escalation.

Dec 1, 2025, 6:00 PMOfficial source

Android Framework Information Disclosure Vulnerability

critical
activeCISA KEVCVE-2025-48633

Android Framework contains an unspecified vulnerability that allows for information disclosure.

Dec 1, 2025, 6:00 PMOfficial source

Google Chromium V8 Type Confusion Vulnerability

critical
activeCISA KEVCVE-2025-13223

Google Chromium V8 contains a type confusion vulnerability that allows for heap corruption.

Nov 18, 2025, 6:00 PMOfficial source

Google Chromium V8 Type Confusion Vulnerability

critical
activeCISA KEVCVE-2025-10585

Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.

Sep 22, 2025, 7:00 PMOfficial source

Android Runtime Use-After-Free Vulnerability

critical
activeCISA KEVCVE-2025-48543

Android Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation.

Sep 3, 2025, 7:00 PMOfficial source

Google Chromium ANGLE and GPU Improper Input Validation Vulnerability

critical
activeCISA KEVCVE-2025-6558

Google Chromium contains an improper input validation vulnerability in ANGLE and GPU. This vulnerability could allow a remote attacker to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Jul 21, 2025, 7:00 PMOfficial source

Google Chromium V8 Type Confusion Vulnerability

critical
activeCISA KEVCVE-2025-6554

Google Chromium V8 contains a type confusion vulnerability that could allow a remote attacker to perform arbitrary read/write via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Jul 1, 2025, 7:00 PMOfficial source

Google Chromium V8 Out-of-Bounds Read and Write Vulnerability

critical
activeCISA KEVCVE-2025-5419

Google Chromium V8 contains an out-of-bounds read and write vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Jun 4, 2025, 7:00 PMOfficial source

Google Chromium Mojo Sandbox Escape Vulnerability

critical
activeCISA KEVCVE-2025-2783

Google Chromium Mojo on Windows contains a sandbox escape vulnerability caused by a logic error, which results from an incorrect handle being provided in unspecified circumstances. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Mar 26, 2025, 7:00 PMOfficial source

Android Framework Privilege Escalation Vulnerability

critical
activeCISA KEVCVE-2024-43093

Android Framework contains an unspecified vulnerability that allows for privilege escalation.

Nov 6, 2024, 6:00 PMOfficial source

Google Chromium V8 Inappropriate Implementation Vulnerability

critical
activeCISA KEVCVE-2024-7965

Google Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Aug 27, 2024, 7:00 PMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Google threat watch page?

It is the Google-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Google watch page?

Use it to confirm whether current Google issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Google security issues?

Yes. ITECS can help map Google advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.