Kaspersky ID:
KLA20109
Detect Date:
12/05/2022
Updated:
03/17/2024

Description

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface, gain privileges.

Below is a complete list of vulnerabilities:

  1. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  2. Use after free vulnerability in Forms can be exploited to cause denial of service or execute arbitrary code.
  3. Use after free vulnerability in Mojo can be exploited to cause denial of service or execute arbitrary code.
  4. Use after free vulnerability in Live Caption can be exploited to cause denial of service or execute arbitrary code.
  5. Data validation vulnerability in Directory can be exploited to cause denial of service.
  6. Policy enforcement vulnerability in Popup Blocker can be exploited to cause denial of service.
  7. Validation of untrusted input vulnerability in CORS can be exploited to cause denial of service.
  8. Implementation vulnerability in Navigation can be exploited to cause denial of service.
  9. Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
  10. Policy enforcement vulnerability in Safe Browsing can be exploited to cause denial of service.
  11. Use after free vulnerability in Audio can be exploited to cause denial of service or execute arbitrary code.
  12. Use after free vulnerability in Sign-In can be exploited to cause denial of service or execute arbitrary code.
  13. Implementation vulnerability in Fenced Frames can be exploited to cause denial of service.
  14. Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
  15. Validation of untrusted input vulnerability in Downloads can be exploited to cause denial of service.
  16. Policy enforcement vulnerability in File System API can be exploited to cause denial of service.
  17. Use after free vulnerability in Camera Capture can be exploited to cause denial of service or execute arbitrary code.
  18. Policy enforcement vulnerability in Autofill can be exploited to cause denial of service.
  19. Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
  20. An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
  21. A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
  22. An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) Update can be exploited remotely to gain privileges.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2022-4174
    critical
  • CVE-2022-4181
    critical
  • CVE-2022-4180
    critical
  • CVE-2022-4192
    critical
  • CVE-2022-4190
    critical
  • CVE-2022-4183
    warning
  • CVE-2022-4188
    warning
  • CVE-2022-4185
    warning
  • CVE-2022-4177
    critical
  • CVE-2022-4195
    warning
  • CVE-2022-4179
    critical
  • CVE-2022-4191
    critical
  • CVE-2022-4182
    warning
  • CVE-2022-4189
    warning
  • CVE-2022-4186
    warning
  • CVE-2022-4187
    high
  • CVE-2022-4193
    critical
  • CVE-2022-4175
    critical
  • CVE-2022-4178
    critical
  • CVE-2022-4184
    warning
  • CVE-2022-4194
    critical
  • CVE-2022-4262
    critical
  • CVE-2022-44708
    critical
  • CVE-2022-44688
    warning
  • CVE-2022-41115
    high

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.