9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
78.9%
08/05/2022
High
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, gain privileges, obtain sensitive information, bypass security restrictions.
Public exploits exist for this vulnerability.
Microsoft Edge (Chromium-based)
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
CVE-2022-2616
CVE-2022-2615
CVE-2022-2621
CVE-2022-2614
CVE-2022-35796
CVE-2022-2624
CVE-2022-2622
CVE-2022-2611
CVE-2022-2610
CVE-2022-2612
CVE-2022-2623
CVE-2022-2617
CVE-2022-33649
CVE-2022-33636
CVE-2022-2619
CVE-2022-2618
CVE-2022-2606
CVE-2022-2603
CVE-2022-2605
CVE-2022-2604
ACE
CVE-2022-26056.5High
CVE-2022-26106.5High
CVE-2022-26068.8Critical
CVE-2022-26148.8Critical
CVE-2022-26238.8Critical
CVE-2022-26194.3Warning
CVE-2022-26178.8Critical
CVE-2022-26126.5High
CVE-2022-26166.5High
CVE-2022-26038.8Critical
CVE-2022-26114.3Warning
CVE-2022-26048.8Critical
CVE-2022-26218.8Critical
CVE-2022-26156.5High
CVE-2022-26226.5High
CVE-2022-26248.8Critical
CVE-2022-26186.5High
CVE-2022-357967.5Critical
CVE-2022-336499.6Critical
CVE-2022-336368.3Critical
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2603
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2604
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2605
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2606
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2610
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2611
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2612
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2616
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2617
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2618
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2621
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2622
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2623
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2624
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33636
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33649
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35796
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2603
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2604
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2605
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2606
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2610
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2611
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2612
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2614
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2615
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2616
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2617
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2618
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2619
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2621
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2622
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2623
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2624
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33636
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33649
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35796
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
support.microsoft.com/en-us/topic/microsoft-edge-update-settings-af8aaca2-1b69-4870-94fe-18822dbb7ef1
threats.kaspersky.com/en/product/Microsoft-Edge/
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
78.9%