8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.015 Low
EPSS
Percentile
87.1%
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, gain privileges, spoof user interface, execute arbitrary code.
Below is a complete list of vulnerabilities:
CVE-2023-1229 warning
CVE-2023-1224 warning
CVE-2023-1218 warning
CVE-2023-1230 warning
CVE-2023-1223 warning
CVE-2023-1216 warning
CVE-2023-1217 warning
CVE-2023-1215 warning
CVE-2023-1220 critical
CVE-2023-1231 warning
CVE-2023-1233 warning
CVE-2023-1236 warning
CVE-2023-1222 warning
CVE-2023-1221 warning
CVE-2023-1232 warning
CVE-2023-1214 warning
CVE-2023-1234 warning
CVE-2023-1219 critical
CVE-2023-1235 warning
CVE-2023-1228 warning
CVE-2023-1213 warning
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1213
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1214
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1215
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1216
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1217
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1218
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1219
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1220
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1221
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1222
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1223
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1224
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1228
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1229
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1230
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1231
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1232
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1233
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1234
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1235
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1236
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Edge/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.015 Low
EPSS
Percentile
87.1%