Sunday, April 6, 2025
Homecyber securityMicrosoft Patched a Critical Edge Flaw that Led to Arbitrary Code Execution

Microsoft Patched a Critical Edge Flaw that Led to Arbitrary Code Execution

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has addressed several critical vulnerabilities in its Chromium-based Edge browser. Users of the affected versions are strongly advised to update to the latest version to mitigate potential security risks.

According to the Asec Ahnlab reports, the vulnerabilities were found in Microsoft Edge versions 127.0.6533.88 and 127.0.6533.89.

These versions are based on the Chromium engine, widely used across various web browsers for its performance and security features.

How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide

Resolved Vulnerabilities

Microsoft’s security update resolves three critical vulnerabilities that could allow attackers to execute arbitrary code or perform out-of-bounds (OOB) memory access via specially crafted HTML content. The details of the vulnerabilities are as follows:

  1. Improper Data Validation in Dawn (CVE-2024-7256):
    • This vulnerability allows attackers to execute arbitrary code by exploiting improper data validation in Microsoft Edge’s Dawn component. Crafted HTML content can trigger this flaw, leading to potential system compromise.
  2. Uninitialized Use in Dawn (CVE-2024-6990):
    • An uninitialized use vulnerability in the Dawn component permits attackers to perform OOB memory access. This flaw can be exploited using crafted HTML, potentially leading to system instability or further exploitation.
  3. Vulnerability in WebTransport Feature (CVE-2024-7255):
    • A vulnerability in the WebTransport feature of Microsoft Edge allows attackers to perform OOB memory access via crafted HTML. This flaw could be used to compromise the security of the affected system.

Vulnerability Patches

Microsoft has released specific patches to address these vulnerabilities in the latest update.

Users are encouraged to download and install the updates through the Windows Update feature or by visiting the official Microsoft website.

Microsoft Edge 127.0.6533.88/89 (Chromium-based) Version: The patches are available for download and installation to ensure users are protected from these critical vulnerabilities.

Security experts emphasize the importance of keeping software up to date to protect against emerging threats. Microsoft’s prompt response to these vulnerabilities underscores its commitment to user security.

Users of Microsoft Edge are urged to update their browsers immediately to safeguard their systems from potential exploits.

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...