Lucene search

K
kasperskyKaspersky LabKLA12519
HistoryApr 28, 2022 - 12:00 a.m.

KLA12519 Multiple vulnerabilities in Microsoft Browser

2022-04-2800:00:00
Kaspersky Lab
threats.kaspersky.com
15

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.6%

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, gain privileges, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in Device API can be exploited to cause denial of service or execute arbitrary code.
  2. Data validation vulnerability in Dev Tools can be exploited to cause denial of service.
  3. Data validation vulnerability in Trusted Types can be exploited to cause denial of service.
  4. Implementation vulnerability in WebGL can be exploited to cause denial of service.
  5. Use after free vulnerability in SwiftShader can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in Browser Switcher can be exploited to cause denial of service or execute arbitrary code.
  7. Implementation vulnerability in HTML Parser can be exploited to cause denial of service.
  8. Data validation vulnerability in Blink Editing can be exploited to cause denial of service.
  9. Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
  10. Heap buffer overflow vulnerability in Web UI Settings can be exploited to cause denial of service.
  11. Implementation vulnerability in Extensions API can be exploited to cause denial of service.
  12. Use after free vulnerability in File System can be exploited to cause denial of service or execute arbitrary code.
  13. Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
  14. Implementation vulnerability in Input can be exploited to cause denial of service.
  15. Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
  16. Implementation vulnerability in iframe can be exploited to cause denial of service.
  17. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  18. Use after free vulnerability in Sharing can be exploited to cause denial of service or execute arbitrary code.
  19. Security UI vulnerability in Downloads can be exploited to bypass security restrictions.
  20. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  21. Elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
  22. Spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
  23. Heap buffer overflow vulnerability in WebGPU can be exploited to cause denial of service.
  24. Implementation vulnerability in WebAuthentication can be exploited to cause denial of service.
  25. Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.

Original advisories

CVE-2022-1480

CVE-2022-1500

CVE-2022-1494

CVE-2022-1482

CVE-2022-1478

CVE-2022-1490

CVE-2022-1498

CVE-2022-1492

CVE-2022-1491

CVE-2022-1484

CVE-2022-1488

CVE-2022-1485

CVE-2022-1493

CVE-2022-1497

CVE-2022-1477

CVE-2022-1501

CVE-2022-1479

CVE-2022-1481

CVE-2022-1495

CVE-2022-1486

CVE-2022-29146

CVE-2022-29147

CVE-2022-1483

CVE-2022-1499

CVE-2022-1487

Related products

Microsoft-Edge

CVE list

CVE-2022-1497 high

CVE-2022-1490 critical

CVE-2022-1477 critical

CVE-2022-1482 high

CVE-2022-1487 critical

CVE-2022-1488 warning

CVE-2022-1478 critical

CVE-2022-1485 critical

CVE-2022-1500 high

CVE-2022-1491 critical

CVE-2022-1492 high

CVE-2022-1495 warning

CVE-2022-1481 critical

CVE-2022-1483 critical

CVE-2022-1486 critical

CVE-2022-1494 high

CVE-2022-1484 critical

CVE-2022-1493 critical

CVE-2022-1501 high

CVE-2022-1479 critical

CVE-2022-1498 warning

CVE-2022-1480 warning

CVE-2022-1499 high

CVE-2022-29146 critical

CVE-2022-29147 warning

KB list

Solution

Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)

Microsoft Edge update settings

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Edge (Chromium-based)

References

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.6%