6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.5%
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
CVE-2021-38011 critical
CVE-2021-38010 high
CVE-2021-38012 critical
CVE-2021-38019 high
CVE-2021-38006 critical
CVE-2021-38008 critical
CVE-2021-38021 high
CVE-2021-38005 critical
CVE-2021-38015 critical
CVE-2021-38017 critical
CVE-2021-38013 critical
CVE-2021-38020 warning
CVE-2021-38016 critical
CVE-2021-38014 critical
CVE-2021-38007 critical
CVE-2021-38009 high
CVE-2021-38018 high
CVE-2021-38022 high
CVE-2021-42308 warning
CVE-2021-43220 warning
CVE-2021-43221 warning
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
nvd.nist.gov/vuln/detail/CVE-2021-38005
nvd.nist.gov/vuln/detail/CVE-2021-38006
nvd.nist.gov/vuln/detail/CVE-2021-38007
nvd.nist.gov/vuln/detail/CVE-2021-38008
nvd.nist.gov/vuln/detail/CVE-2021-38009
nvd.nist.gov/vuln/detail/CVE-2021-38010
nvd.nist.gov/vuln/detail/CVE-2021-38011
nvd.nist.gov/vuln/detail/CVE-2021-38012
nvd.nist.gov/vuln/detail/CVE-2021-38013
nvd.nist.gov/vuln/detail/CVE-2021-38014
nvd.nist.gov/vuln/detail/CVE-2021-38015
nvd.nist.gov/vuln/detail/CVE-2021-38016
nvd.nist.gov/vuln/detail/CVE-2021-38017
nvd.nist.gov/vuln/detail/CVE-2021-38018
nvd.nist.gov/vuln/detail/CVE-2021-38019
nvd.nist.gov/vuln/detail/CVE-2021-38020
nvd.nist.gov/vuln/detail/CVE-2021-38021
nvd.nist.gov/vuln/detail/CVE-2021-38022
nvd.nist.gov/vuln/detail/CVE-2021-42308
nvd.nist.gov/vuln/detail/CVE-2021-43220
nvd.nist.gov/vuln/detail/CVE-2021-43221
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Edge/
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.5%