#VU85817 Input validation error in Microsoft Edge


Published: 2024-01-26

Vulnerability identifier: #VU85817

Vulnerability risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-21326

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Microsoft Edge
Client/Desktop applications / Web browsers

Vendor: Microsoft

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim to open a specially crafted website and execute arbitrary code on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Microsoft Edge: 120.0.2210.61 - 120.0.2336.0, 119.0.2151.44 - 119.0.2151.97, 118.0.2088.46 - 118.0.2088.122, 117.0.2045.31 - 117.0.2045.60, 116.0.1938.54 - 116.0.1938.98, 109.0.1343.27 - 109.0.1518.140, 115.0.1901.183 - 115.0.1901.203, 114.0.1823.37 - 114.0.1901.183, 113.0.1774.35 - 113.0.1774.57, 112.0.1722.34 - 112.0.1722.84, 111.0.1661.41 - 111.0.1661.62, 110.0.1587.41 - 110.0.1587.78, 108.0.1293.81 - 108.0.1462.95, 106.0.1370.34 - 106.0.1370.86, 107.0.1418.24 - 107.0.1418.62, 105.0.1343.25 - 105.0.1343.53, 104.0.1293.47 - 104.0.1293.91, 103.0.1264.37 - 103.0.1264.77, 102.0.1245.30 - 102.0.1245.62, 101.0.1210.32 - 101.0.1210.53, 100.0.1185.29 - 100.0.1185.60, 98.0.1108.43 - 98.0.1108.92, 99.0.1150.30 - 99.0.1150.55, 97.0.1072.55 - 97.0.1072.76, 96.0.1054.29 - 96.0.1054.75, 95.0.1020.30 - 95.0.1020.53, 94.0.992.31 - 94.0.992.58, 79.0.309.71 - 79.0.3945.130, 93.0.961.38 - 93.0.961.52, 92.0.902.55 - 92.0.902.84, 91.0.864.37 - 91.0.864.71, 90.0.818.39 - 90.0.818.66, 89.0.774.45 - 89.0.774.77, 88.0.705.50 - 88.0.705.81, 87.0.664.41 - 87.0.664.75, 86.0.622.43 - 86.0.622.69, 84.0.522.40, 83.0.478.37


External links
http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21326


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability