8.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:P/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.032 Low
EPSS
Percentile
91.2%
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, bypass security restrictions, spoof user interface, execute arbitrary code.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-27844 critical
CVE-2021-21159 critical
CVE-2021-21160 critical
CVE-2021-21161 critical
CVE-2021-21162 critical
CVE-2021-21163 high
CVE-2021-21164 high
CVE-2021-21165 critical
CVE-2021-21166 critical
CVE-2021-21167 critical
CVE-2021-21168 high
CVE-2021-21169 critical
CVE-2021-21170 high
CVE-2021-21171 high
CVE-2021-21172 critical
CVE-2021-21173 high
CVE-2021-21174 critical
CVE-2021-21175 high
CVE-2021-21176 high
CVE-2021-21177 high
CVE-2021-21178 high
CVE-2021-21179 critical
CVE-2021-21180 critical
CVE-2021-21181 high
CVE-2021-21182 high
CVE-2021-21183 warning
CVE-2021-21184 warning
CVE-2021-21185 warning
CVE-2021-21186 warning
CVE-2021-21187 warning
CVE-2021-21188 critical
CVE-2021-21189 warning
CVE-2021-21190 critical
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-27844
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21159
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21160
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21161
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21162
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21163
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21164
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21165
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21166
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21167
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21168
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21169
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21170
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21171
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21172
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21173
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21174
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21175
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21176
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21177
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21178
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21179
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21180
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21181
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21182
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21183
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21184
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21185
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21186
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21187
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21188
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21189
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2021-21190
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
8.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:P/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.032 Low
EPSS
Percentile
91.2%