CVE-2021-21188
ENISA EUVD: EUVD-2021-8579 ↗
✓ Confirmed 0-Day
Triaged: March 20, 2026
2 articles
Published: 2021-03-09
EPSS Score
Source: FIRST.org · 2026-05-23
1.28%
probability
This CVE has a 1.28% probability
of being exploited in the next 30 days.
0%
Top 79.8th percentile of all CVEs
100%
CVSS v3.1
Source: NVD8.8
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v2 (legacy)
6.8
MEDIUM
Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
AV:N/AC:M/Au:N/C:P/I:P/A:P
Description
VulnerabilityLookup (CNA)Use after free in Blink in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Affected Products
Google
Chrome
unspecified
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
https://crbug.com/1161739
x_refsource_MISC
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FE5SIKEVYTMDCC5OSXGOM2KRPYLHYMQX/
vendor-advisory
x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBT54RKAE5XLMWSHLVUKJ7T2XHHYMXLH/
vendor-advisory
x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIDZ77XUDMB2EBPPWCQXPEIJERDNSNT/
vendor-advisory
x_refsource_FEDORA
https://www.debian.org/security/2021/dsa-4886
vendor-advisory
x_refsource_DEBIAN
Signal Intelligence
Confidence
85%
EPSS
1.28%
CVSS v3.1
8.8
Mentions
2
Last Seen
Mar 09, 2021
CNA Information
CNA Assigner
Chrome
Analyst Note
Article [1] explicitly names this as 'actively exploited Chrome zero-day bug' fixed by Google in 2021, confirming in-the-wild exploitation. The timing aligns with the CVE year (2021) and patch release, meeting zero-day criteria. Article [2] is a Microsoft Patch Tuesday article mentioning zero-days but does not appear to reference this Chrome CVE specifically.
Triage Info
Decided atMar 20, 2026
Published DateMar 09, 2021