Lucene search

K
kasperskyKaspersky LabKLA62330
HistoryDec 07, 2023 - 12:00 a.m.

KLA62330 Multiple vulnerabilities in Microsoft Browser

2023-12-0700:00:00
Kaspersky Lab
threats.kaspersky.com
9
microsoft browser
critical severity
microsoft edge
sensitive information
denial of service
code execution
security bypass
update settings

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, execute arbitrary code, bypass security restrictions, gain privileges.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
  2. Implementation vulnerability in Autofill can be exploited to cause denial of service.
  3. Use after free vulnerability in Media Stream can be exploited to cause denial of service or execute arbitrary code.
  4. Use after free vulnerability in Side Panel Search can be exploited to cause denial of service or execute arbitrary code.
  5. Use after free vulnerability in Media Capture can be exploited to cause denial of service or execute arbitrary code.
  6. Implementation vulnerability in Web Browser UI can be exploited to cause denial of service.
  7. An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.

Original advisories

CVE-2023-38174

CVE-2023-6511

CVE-2023-6508

CVE-2023-6509

CVE-2023-36880

CVE-2023-6510

CVE-2023-6512

CVE-2023-35618

Related products

Microsoft-Edge

CVE list

CVE-2023-6508 warning

CVE-2023-6509 warning

CVE-2023-6511 warning

CVE-2023-6510 warning

CVE-2023-6512 warning

CVE-2023-38174 warning

CVE-2023-36880 warning

CVE-2023-35618 warning

Solution

Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)

Microsoft Edge update settings

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Microsoft Edge (Chromium-based)

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%