CVE-2026-3929
Received
Received - Intake
Side-Channel Data Leak in Chrome ResourceTiming Prior to
Publication date: 2026-03-11
Last updated on: 2026-03-13
Assigner: Chrome
Description
Description
Side-channel information leakage in ResourceTiming in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| chrome | to 146.0.7680.71 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1300 | The device does not contain sufficient protection mechanisms to prevent physical side channels from exposing sensitive information due to patterns in physically observable phenomena such as variations in power consumption, electromagnetic emissions (EME), or acoustic emissions. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
I don't know
Can you explain this vulnerability to me?
This vulnerability is a side-channel information leakage issue in the ResourceTiming feature of Google Chrome versions prior to 146.0.7680.71.
It allows a remote attacker to leak cross-origin data by using a specially crafted HTML page.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can obtain information from other origins (websites) that the user may be visiting, potentially exposing sensitive data.
This could lead to privacy breaches or unauthorized data disclosure through the crafted HTML page.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70