Kaspersky ID:
KLA12548
Detect Date:
05/31/2022
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Inappropriate implementation vulnerability in Extensions API can be exploited to cause denial of service.
  2. An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
  3. Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
  4. Insufficient policy enforcement in File System API can be exploited to cause denial of service.
  5. Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in Indexed DB can be exploited to cause denial of service or execute arbitrary code.
  7. Insufficient policy enforcement in Extensions API can be exploited to cause denial of service.
  8. Use after free in Bookmarks vulnerability can be exploited to cause denial of service or execute arbitrary code.
  9. Insufficient policy enforcement in Safe Browsing can be exploited to cause denial of service.
  10. A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
  11. Use after free vulnerability in Messaging can be exploited to cause denial of service or execute arbitrary code.
  12. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  13. Use after free vulnerability in Performance Manager can be exploited to cause denial of service or execute arbitrary code.
  14. Use after free vulnerability in App Service can be exploited to cause denial of service or execute arbitrary code.
  15. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  16. Insufficient policy enforcement in COOP can be exploited to cause denial of service.
  17. Inappropriate implementation vulnerability in PDF can be exploited to cause denial of service.
  18. Out of bounds read vulnerability in DevTools can be exploited to cause denial of service.
  19. Use after free vulnerability in WebApp Installs can be exploited to cause denial of service or execute arbitrary code.
  20. Insufficient validation of untrusted input in Data Transfer can be exploited to cause denial of service.
  21. Heap buffer overflow vulnerability in DevTools can be exploited to cause denial of service.
  22. Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.

Original advisories

Related products

CVE list

  • CVE-2022-1862
    high
  • CVE-2022-1865
    critical
  • CVE-2022-1867
    high
  • CVE-2022-1871
    warning
  • CVE-2022-1857
    critical
  • CVE-2022-1872
    warning
  • CVE-2022-1873
    high
  • CVE-2022-1868
    high
  • CVE-2022-1858
    high
  • CVE-2022-1859
    critical
  • CVE-2022-1863
    critical
  • CVE-2022-1874
    critical
  • CVE-2022-1855
    critical
  • CVE-2022-1876
    critical
  • CVE-2022-1869
    high
  • CVE-2022-1870
    critical
  • CVE-2022-1853
    critical
  • CVE-2022-1854
    critical
  • CVE-2022-1856
    critical
  • CVE-2022-1875
    warning
  • CVE-2022-1864
    critical
  • CVE-2022-30127
    critical
  • CVE-2022-26905
    warning
  • CVE-2022-30128
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.