CVE-2023-36026: Microsoft Edge (Chromium-based) Spoofing Vulnerability

Overview

Severity
Medium (CVSS 4.3)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Nov
Released
2023-11-16
Last Updated
2024-10-10
EPSS Score
0.23% (percentile: 45.6%)

FAQ

Why is the severity for this CVE rated as Moderate, but the CVSS score is higher than normal? Per our severity guidelines, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity, specifically it says, "If a bug requires more than a click, a key press, or several preconditions, the severity will be downgraded". The CVSS scoring system doesn't allow for this type of nuance. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The attacker is able to bypass the warning on the permissions message when visiting a potentially malicious website. What is the version information for this release? Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version Stable 119.0.2151.72 11/16/2023 119.0.6045.159/.160 Extended Stable 118.0.2088.109 11/16/2023 118.0.5993.144 According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker.

Affected Products (2)

Browser

  • Microsoft Edge (Chromium-based)
  • Microsoft Edge (Chromium-based) Extended Stable

Acknowledgments

Anonymous

Revision History

  • 2023-11-16: Information published.
  • 2024-10-10: Corrected Build Numbers in the Security Updates table. This is an informational change only.