8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.642 Medium
EPSS
Percentile
97.9%
The version of Microsoft Edge (Chromium) installed on the remote Windows host is prior to 109.0.1518.140. It is, therefore, affected by a heap buffer vulnerability in WebP as referenced in the September 15, 2023 advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(195172);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/09");
script_cve_id("CVE-2023-4863");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/10/04");
script_name(english:"Microsoft Edge (Chromium) < 109.0.1518.140 Heap Buffer Overflow Vulnerability");
script_set_attribute(attribute:"synopsis", value:
"The remote host has an web browser installed that is affected by a heap buffer overflow vulnerability.");
script_set_attribute(attribute:"description", value:
"The version of Microsoft Edge (Chromium) installed on the remote Windows host is prior to 109.0.1518.140. It is, therefore,
affected by a heap buffer vulnerability in WebP as referenced in the September 15, 2023 advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
# https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#september-15-2023
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5fd8726e");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863");
script_set_attribute(attribute:"solution", value:
"Upgrade to Microsoft Edge (Chromium) version 109.0.1518.140 or later.
Please note that this backported fix is the final update made available for Windows Server 2012 / 2012 R2, Windows 8 / 8.1
and Windows 7. If your operating system is Windows 10 or newer, it is recommended to update to Microsoft Edge (Chromium)
110.x or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-4863");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/09/29");
script_set_attribute(attribute:"patch_publication_date", value:"2023/09/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/08");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:edge");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("microsoft_edge_chromium_installed.nbin", "smb_hotfixes.nasl");
script_require_keys("installed_sw/Microsoft Edge (Chromium)", "SMB/Registry/Enumerated");
exit(0);
}
include('vcf.inc');
include('smb_hotfixes.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');
if (hotfix_check_sp_range(win7:'0', win8:'0', win81:'0') <= 0)
audit(AUDIT_OS_SP_NOT_VULN);
var app_info = vcf::get_app_info(app:'Microsoft Edge (Chromium)', win_local:TRUE);
var constraints = [ { 'fixed_version' : '109.0.1518.140' } ];
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_HOLE
);
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.642 Medium
EPSS
Percentile
97.9%