Lucene search

K
kasperskyKaspersky LabKLA12513
HistoryApr 15, 2022 - 12:00 a.m.

KLA12513 Multiple vulnerabilities in Microsoft Browser

2022-04-1500:00:00
Kaspersky Lab
threats.kaspersky.com
45
microsoft browser
malicious users
arbitrary code execution
denial of service
privileges
security restrictions
cve-2022-1308
cve-2022-1307
cve-2022-1364
cve-2022-1305
cve-2022-29144
cve-2022-1313
cve-2022-1306
cve-2022-1310
cve-2022-1309
cve-2022-1312
cve-2022-1314
public exploits
malware
microsoft-edge

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.02

Percentile

89.1%

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in BFCache can be exploited to cause denial of service or execute arbitrary code.
  2. Implementation vulnerability in full screen can be exploited to cause denial of service.
  3. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  4. Use after free vulnerability in storage can be exploited to cause denial of service or execute arbitrary code.
  5. An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
  6. Use after free vulnerability in tab groups can be exploited to cause denial of service or execute arbitrary code.
  7. Implementation vulnerability in compositing can be exploited to cause denial of service.
  8. Use after free vulnerability in regular expressions can be exploited to cause denial of service or execute arbitrary code.
  9. Security vulnerability in developer tools area can be exploited to bypass security restrictions.

Original advisories

CVE-2022-1308

CVE-2022-1307

CVE-2022-1364

CVE-2022-1305

CVE-2022-29144

CVE-2022-1313

CVE-2022-1306

CVE-2022-1310

CVE-2022-1309

CVE-2022-1312

CVE-2022-1314

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Edge

CVE list

CVE-2022-1305 critical

CVE-2022-1313 critical

CVE-2022-1309 critical

CVE-2022-1312 critical

CVE-2022-1314 critical

CVE-2022-1308 critical

CVE-2022-1310 critical

CVE-2022-1307 warning

CVE-2022-1306 warning

CVE-2022-1364 critical

CVE-2022-29144 critical

KB list

Solution

Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)

Microsoft Edge update settings

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Microsoft Edge (Chromium-based)

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.02

Percentile

89.1%