Insight Type: Blog
Maidar Secure Advisory: Spoofing Vulnerability CVE-2023-36559 on Microsoft Edge Chromium-based

Microsoft took action on Friday, October 13, 2023, by releasing a security update guide in response to a vulnerability that impacts their Chromium-based web browser, Microsoft Edge. The vulnerability is identified as CVE-2023-36559 with a base score of 4.2,  there is limited information available about the specific spoofing methods that can be used to exploit it due to the recent discovery of this vulnerability. To safeguard against this risk, it is imperative to take immediate action and implement the recommended security measures – Update Chromium-based web browser, Microsoft Edge to most recent version.

Vulnerabilities Discussed

CVE-2023-36559

Table of Contents

  • Details of the Vulnerability
  • Current Scope of the Attack
  • Conclusion
  • References

Details of the Vulnerabilities

To exploit this vulnerability successfully, an attacker must first perform specific preparatory actions to configure the target environment. These actions involve luring the user into clicking on a specially crafted URL, which then allows the attacker to compromise the user’s system. It’s important to note that from the exploitation of this vulnerability there are limited impacts on Confidentiality and Integrity, with no impact on Availability. In addition, the attacker would need to combine this vulnerability with other vulnerabilities to carry out a successful attack.

Current Scope of the Attack

To date, Microsoft remains unenlightened of any malevolent exploitation of this vulnerability.

Countermeasures

As a countermeasure, it is advisable to keep your Microsoft Edge browser up-to-date by installing the latest Microsoft Edge Stable Channel, version 118.0.2088.46, which includes the most recent security updates from the Chromium project. This will help enhance the security of your browsing experience.

Conclusion

By updating Microsoft Edge to the latest stable channel version, the customers can minimize exposure to this threat. We will keep a close eye on the latest version release.

References

Contact Us

If you have any questions or require further information on any other cybersecurity matters, please don’t hesitate to contact our dedicated team at [email protected].

If you want to see more about the SOC service we offer, please follow this link https://maidar.io

To ask a question, go to our support portal, Maidar Secure SOC Customer Support

Or Opt-In to our Threat Advisory Services here

Share Articles

Insights

News Centre

Media Type
Why SOAR is important… How is it different… How it helps your org...
Many organisations today want to harness the power of automation to rid themselves of redundant and tedious tasks. Triaging alerts into incidents or initiating the overly complex process of blocking a known threat acto...
How a Security Operations Centre Enhances Your Security Awareness...
In today’s digital landscape, organisations face a constant barrage of cyber threats that can disrupt operations, compromise sensitive data, and damage reputations. To safeguard against these risks, businesses em...
Artificial Intelligence in The Security Operations Center (SOC): ...
In today’s rapidly evolving digital landscape, businesses face constant threats from cybercriminals seeking to exploit vulnerabilities in their systems. As organisations strive to protect their sensitive data and...
Maidar Secure Advisory: SMM Driver Input Validation Vulnerability...
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, a...
Maidar Secure Advisory: SMM Driver Input Validation Vulnerability...
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, a...
Maidar Secure Advisory: 0‑days exploit Vulnerability CVE‑2023‑419...
Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0‑day exploit chain for iPhones. Developed by the commercial surveillance vendor, Intellexa, this exploit chain is us...
Hope is not a security strategy. Get proactive about your defence today with Maidar Secure.