8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.009 Low
EPSS
Percentile
82.4%
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface, gain privileges.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2023-2929 critical
CVE-2023-2941 warning
CVE-2023-2937 warning
CVE-2023-2932 critical
CVE-2023-2940 high
CVE-2023-2935 critical
CVE-2023-2930 critical
CVE-2023-2939 critical
CVE-2023-2934 critical
CVE-2023-2938 warning
CVE-2023-2933 critical
CVE-2023-2936 critical
CVE-2023-2931 critical
CVE-2023-29345 high
CVE-2023-33143 critical
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2929
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2930
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2931
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2932
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2933
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2934
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29345
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2935
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2936
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2937
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2938
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2939
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2940
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2941
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33143
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.4 High
AI Score
Confidence
High
0.009 Low
EPSS
Percentile
82.4%