Lucene search

K
kasperskyKaspersky LabKLA51267
HistoryJul 21, 2023 - 12:00 a.m.

KLA51267 Multiple vulnerabilities in Microsoft Browser

2023-07-2100:00:00
Kaspersky Lab
threats.kaspersky.com
8
microsoft browser
denial of service
arbitrary code execution
user interface spoofing
privilege escalation
microsoft edge (chromium-based) extended stable
edge for android
settings
cve-2023-3733
cve-2023-3740
cve-2023-3738
cve-2023-3736
cve-2023-3734
cve-2023-3728
cve-2023-3732
cve-2023-3730
cve-2023-3727
cve-2023-3737
cve-2023-3735
cve-2023-35392
cve-2023-38187
cve-2023-38173
microsoft official advisories
kaspersky microsoft edge

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.8%

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface, gain privileges.

Below is a complete list of vulnerabilities:

  1. Implementation vulnerability in Web API Permission can be exploited to cause denial of service.
  2. Implementation vulnerability in Custom Tabs can be exploited to cause denial of service.
  3. Implementation vulnerability in Autofill can be exploited to cause denial of service.
  4. Validation of untrusted input vulnerability in Them can be exploited to cause denial of service.
  5. Out of bounds memory access vulnerability in Mojo can be exploited to cause denial of service.
  6. Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
  7. A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
  8. Implementation vulnerability in Notifications can be exploited to cause denial of service.
  9. Implementation vulnerability in WebApp Installs can be exploited to cause denial of service.
  10. An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
  11. Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
  12. Implementation vulnerability in Picture In Picture can be exploited to cause denial of service.
  13. A spoofing vulnerability in Microsoft Edge for Android can be exploited remotely to spoof user interface.

Original advisories

CVE-2023-3735

CVE-2023-3736

CVE-2023-3738

CVE-2023-3740

CVE-2023-3732

CVE-2023-3730

CVE-2023-35392

CVE-2023-3737

CVE-2023-3733

CVE-2023-38187

CVE-2023-3728

CVE-2023-3727

CVE-2023-3734

CVE-2023-38173

Related products

Microsoft-Edge

CVE list

CVE-2023-3733 warning

CVE-2023-3740 warning

CVE-2023-3738 warning

CVE-2023-3736 warning

CVE-2023-3734 warning

CVE-2023-3728 critical

CVE-2023-3732 critical

CVE-2023-3730 critical

CVE-2023-3727 critical

CVE-2023-3737 warning

CVE-2023-3735 warning

CVE-2023-35392 warning

CVE-2023-38187 high

CVE-2023-38173 warning

KB list

Solution

Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)

Microsoft Edge update settings

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Edge (Chromium-based) Extended StableMicrosoft Edge for AndroidMicrosoft Edge (Chromium-based)

References

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.8%