CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.8%
The version of Microsoft Edge installed on the remote Windows host is prior to 128.0.2739.42. It is, therefore, affected by multiple vulnerabilities as referenced in the August 22, 2024 advisory.
Microsoft Edge (HTML-based) Memory Corruption Vulnerability (CVE-2024-38207)
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability (CVE-2024-38209, CVE-2024-38210)
Use after free in Passwords in Google Chrome on Android prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2024-7964)
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2024-7965)
Out of bounds memory access in Skia in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page.
(Chromium security severity: High) (CVE-2024-7966)
Heap buffer overflow in Fonts in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2024-7967)
Use after free in Autofill in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2024-7968)
Type Confusion in V8 in Google Chrome prior to 128.0.6613.113 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2024-7969)
Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2024-7971)
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity:
Medium) (CVE-2024-7972)
Heap buffer overflow in PDFium in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. (Chromium security severity: Medium) (CVE-2024-7973)
Insufficient data validation in V8 API in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity:
Medium) (CVE-2024-7974)
Inappropriate implementation in Permissions in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) (CVE-2024-7975)
Inappropriate implementation in FedCM in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) (CVE-2024-7976)
Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: Medium) (CVE-2024-7977)
Insufficient policy enforcement in Data Transfer in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) (CVE-2024-7978)
Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a local attacker to perform privilege escalation via a crafted symbolic link. (Chromium security severity:
Medium) (CVE-2024-7979, CVE-2024-7980)
Inappropriate implementation in Views in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2024-7981)
Inappropriate implementation in WebApp Installs in Google Chrome on Windows prior to 128.0.6613.84 allowed an attacker who convinced a user to install a malicious application to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2024-8033)
Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2024-8034)
Inappropriate implementation in Extensions in Google Chrome on Windows prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2024-8035)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(206172);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/09");
script_cve_id(
"CVE-2024-7964",
"CVE-2024-7965",
"CVE-2024-7966",
"CVE-2024-7967",
"CVE-2024-7968",
"CVE-2024-7969",
"CVE-2024-7971",
"CVE-2024-7972",
"CVE-2024-7973",
"CVE-2024-7974",
"CVE-2024-7975",
"CVE-2024-7976",
"CVE-2024-7977",
"CVE-2024-7978",
"CVE-2024-7979",
"CVE-2024-7980",
"CVE-2024-7981",
"CVE-2024-8033",
"CVE-2024-8034",
"CVE-2024-8035",
"CVE-2024-38207",
"CVE-2024-38209",
"CVE-2024-38210"
);
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/09/18");
script_xref(name:"IAVA", value:"2024-A-0524");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/09/16");
script_name(english:"Microsoft Edge (Chromium) < 128.0.2739.42 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote host has an web browser installed that is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Microsoft Edge installed on the remote Windows host is prior to 128.0.2739.42. It is, therefore, affected
by multiple vulnerabilities as referenced in the August 22, 2024 advisory.
- Microsoft Edge (HTML-based) Memory Corruption Vulnerability (CVE-2024-38207)
- Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability (CVE-2024-38209, CVE-2024-38210)
- Use after free in Passwords in Google Chrome on Android prior to 128.0.6613.84 allowed a remote attacker
to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
(CVE-2024-7964)
- Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to
potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
(CVE-2024-7965)
- Out of bounds memory access in Skia in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who
had compromised the renderer process to perform out of bounds memory access via a crafted HTML page.
(Chromium security severity: High) (CVE-2024-7966)
- Heap buffer overflow in Fonts in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to
potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
(CVE-2024-7967)
- Use after free in Autofill in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had
convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a
crafted HTML page. (Chromium security severity: High) (CVE-2024-7968)
- Type Confusion in V8 in Google Chrome prior to 128.0.6613.113 allowed a remote attacker to potentially
exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2024-7969)
- Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap
corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2024-7971)
- Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to
potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity:
Medium) (CVE-2024-7972)
- Heap buffer overflow in PDFium in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to
perform an out of bounds memory read via a crafted PDF file. (Chromium security severity: Medium)
(CVE-2024-7973)
- Insufficient data validation in V8 API in Google Chrome prior to 128.0.6613.84 allowed a remote attacker
to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity:
Medium) (CVE-2024-7974)
- Inappropriate implementation in Permissions in Google Chrome prior to 128.0.6613.84 allowed a remote
attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
(CVE-2024-7975)
- Inappropriate implementation in FedCM in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to
perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) (CVE-2024-7976)
- Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a
local attacker to perform privilege escalation via a malicious file. (Chromium security severity: Medium)
(CVE-2024-7977)
- Insufficient policy enforcement in Data Transfer in Google Chrome prior to 128.0.6613.84 allowed a remote
attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted
HTML page. (Chromium security severity: Medium) (CVE-2024-7978)
- Insufficient data validation in Installer in Google Chrome on Windows prior to 128.0.6613.84 allowed a
local attacker to perform privilege escalation via a crafted symbolic link. (Chromium security severity:
Medium) (CVE-2024-7979, CVE-2024-7980)
- Inappropriate implementation in Views in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to
perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2024-7981)
- Inappropriate implementation in WebApp Installs in Google Chrome on Windows prior to 128.0.6613.84 allowed
an attacker who convinced a user to install a malicious application to perform UI spoofing via a crafted
HTML page. (Chromium security severity: Low) (CVE-2024-8033)
- Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 128.0.6613.84 allowed a
remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
(CVE-2024-8034)
- Inappropriate implementation in Extensions in Google Chrome on Windows prior to 128.0.6613.84 allowed a
remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
(CVE-2024-8035)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
# https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#august-22-2024
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fcd44e19");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38207");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38209");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38210");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7964");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7965");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7966");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7967");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7968");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7969");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7971");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7972");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7973");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7974");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7975");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7976");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7977");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7978");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7979");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7980");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7981");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8033");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8034");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8035");
script_set_attribute(attribute:"solution", value:
"Upgrade to Microsoft Edge version 128.0.2739.42 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-7974");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2024/08/21");
script_set_attribute(attribute:"patch_publication_date", value:"2024/08/22");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/08/23");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:edge");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("microsoft_edge_chromium_installed.nbin", "smb_hotfixes.nasl");
script_require_keys("installed_sw/Microsoft Edge (Chromium)", "SMB/Registry/Enumerated");
exit(0);
}
include('vcf.inc');
include('smb_hotfixes.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');
if (hotfix_check_sp_range(win10:'0') <= 0)
audit(AUDIT_OS_SP_NOT_VULN);
var app_info = vcf::get_app_info(app:'Microsoft Edge (Chromium)', win_local:TRUE);
var extended = FALSE;
if (app_info['Channel'] == 'extended') extended = TRUE;
var constraints;
if (!extended) {
constraints = [
{ 'fixed_version' : '128.0.2739.42' }
];
} else {
audit(AUDIT_INST_VER_NOT_VULN, 'Microsoft Edge (Chromium)');
};
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_HOLE
);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38209
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38210
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7967
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7968
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7971
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7972
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7980
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8034
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8035
www.nessus.org/u?fcd44e19
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38207
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38209
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38210
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7964
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7965
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7966
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7967
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7968
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7969
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7971
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7972
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7973
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7974
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7975
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7976
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7977
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7978
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7979
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7980
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7981
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8033
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8034
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8035
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.8%