CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
78.8%
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, obtain sensitive information, spoof user interface, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2023-4365 warning
CVE-2023-4359 high
CVE-2023-4363 warning
CVE-2023-4367 high
CVE-2023-4354 critical
CVE-2023-4356 critical
CVE-2023-4357 critical
CVE-2023-4362 critical
CVE-2023-4352 critical
CVE-2023-4364 warning
CVE-2023-4368 critical
CVE-2023-4361 high
CVE-2023-4358 critical
CVE-2023-4351 critical
CVE-2023-4350 high
CVE-2023-4360 warning
CVE-2023-2312 critical
CVE-2023-4366 critical
CVE-2023-4353 critical
CVE-2023-4355 critical
CVE-2023-4349 critical
CVE-2023-36787 critical
CVE-2023-38158 warning
Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-2312
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36787
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38158
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4349
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4350
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4351
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4352
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4353
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4354
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4355
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4356
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4357
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4358
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4359
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4360
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4361
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4362
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4363
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4364
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4365
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4366
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4367
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4368
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/