Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-21399

Опубликовано: 01 фев. 2024
Источник: msrc
CVSS3: 8.3
EPSS Низкий

Описание

Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

FAQ

Microsoft Edge ChannelMicrosoft Edge VersionDate ReleasedBased on Chromium Version
Stable121.0.2277.982/1/2024121.0.6167.139/140
Extended Stable120.0.2210.1672/1/2024120.0.6099.276

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to a browser sandbox escape.

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.

Why is the severity for this CVE rated as Moderate, but the CVSS score is higher than normal?

Per our severity guidelines, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity, specifically it says, "If a bug requires more than a click, a key press, or several preconditions, the severity will be downgraded". The CVSS scoring system doesn't allow for this type of nuance.

How could an attacker exploit this vulnerability via the Network?

An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email.

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 54%
0.00315
Низкий

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
nvd
около 2 лет назад

Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

CVSS3: 8.3
github
около 2 лет назад

Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

CVSS3: 8.3
fstec
около 2 лет назад

Уязвимость браузера Microsoft Edge, связанная с ошибками в настройках безопасности, позволяющая нарушителю обойти защитный механизм песочницы и выполнить произвольный код

EPSS

Процентиль: 54%
0.00315
Низкий

8.3 High

CVSS3