Multiple vulnerabilities in Microsoft Edge



Published: 2022-06-23 | Updated: 2022-06-24
Risk High
Patch available YES
Number of vulnerabilities 12
CVE-ID CVE-2022-30192
CVE-2022-33638
CVE-2022-2156
CVE-2022-2157
CVE-2022-2158
CVE-2022-2160
CVE-2022-2161
CVE-2022-2162
CVE-2022-2163
CVE-2022-2164
CVE-2022-2165
CVE-2022-33639
CWE-ID CWE-20
CWE-416
CWE-843
CWE-264
CWE-358
CWE-362
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Microsoft Edge
Client/Desktop applications / Web browsers

Vendor Microsoft

Security Bulletin

This security bulletin contains information about 12 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU64629

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30192

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim to visit a specially crafted webpage and execute arbitrary code on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33638

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) Input validation error

EUVDB-ID: #VU64628

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-33638

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim to visit a specially crafted webpage and execute arbitrary code on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33638

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

3) Use-after-free

EUVDB-ID: #VU64560

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-2156

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the Base component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1335458
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2156

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

4) Use-after-free

EUVDB-ID: #VU64561

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-2157

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the Interest groups component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1327312
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2157

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

5) Type Confusion

EUVDB-ID: #VU64562

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-2158

CWE-ID: CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error within the V8 component in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger a type confusion error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1321078
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2158

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

6) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU64563

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-2160

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient policy enforcement in DevTools in Google Chrome. A remote attacker can trick the victim to visit a specially crafted website, bypass implemented security measures and gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1116450
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2160

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

7) Use-after-free

EUVDB-ID: #VU64564

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-2161

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within WebApp Provider in Google Chrome. A remote attacker can trick the victim into visiting a specially crafted web page, trigger a use-after-free error and gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1330289
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2161

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

8) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU64565

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-2162

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient policy enforcement in File System API in Google Chrome. A remote attacker can trick the victim to visit a specially crafted website, bypass implemented security measures and gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1307930
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2162

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

9) Use-after-free

EUVDB-ID: #VU64566

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-2163

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to use-after-free error in Cast UI and Toolbar in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and crash the browser.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1308341
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2163

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

10) Improperly implemented security check for standard

EUVDB-ID: #VU64567

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-2164

CWE-ID: CWE-358 - Improperly Implemented Security Check for Standard

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to incorrect implementation in Extensions API in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1268445
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2164

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

11) Input validation error

EUVDB-ID: #VU64568

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-2165

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input in URL formatting in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html
http://crbug.com/1250993
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2165

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

12) Race condition

EUVDB-ID: #VU64670

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-33639

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a race condition when processing HTML content. A remote attacker can trick the victim to visit a specially crafted web page, bypass browser sandbox and execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Microsoft Edge: 79.0.309.71 - 102.0.1245.44


CPE2.3 External links

http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33639

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###