CVE-2023-21775: Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.3)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Jan
Released
2023-01-12
Last Updated
2023-01-17
EPSS Score
0.17% (percentile: 38.9%)

FAQ

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a browser sandbox escape. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. How could an attacker exploit this vulnerability via the Network? An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email.

Affected Products (2)

Browser

  • Microsoft Edge (Chromium-based)
  • Microsoft Edge (Chromium-based) Extended Stable

Acknowledgments

Anonymous

Revision History

  • 2023-01-12: Information published.
  • 2023-01-17: Added Extended Stable build information. This is an informational change only.