Microsoft Edge Multiple Vulnerabilities
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, security restriction bypass and sensitive information disclosure on the targeted system.
Notes:
CVE-2024-7971 is being exploited in the wild. The vulnerability is caused by a type confusion weakness in the Chrome V8 JavaScript engine and can lead to remote code execution on targeted device.
CVE-2024-7965 is being exploited in the wild. The vulnerability allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[Updated on 2024-08-29]
Updated Description.
RISK: Extremely High Risk
TYPE: Clients – Browsers
Impact
- Remote Code Execution
- Denial of Service
- Information Disclosure
- Security Restriction Bypass
System / Technologies affected
- Microsoft Edge (Stable) prior to 128.0.2739.42
Solutions
Before installation of the software, please visit the software vendor web-site for more details.
Apply fixes issued by the vendor:
- Update to Microsoft Edge (Stable) version 128.0.2739.42 or later
Vulnerability Identifier
- CVE-2024-7964
- CVE-2024-7965
- CVE-2024-7966
- CVE-2024-7967
- CVE-2024-7968
- CVE-2024-7969
- CVE-2024-7971
- CVE-2024-7972
- CVE-2024-7973
- CVE-2024-7974
- CVE-2024-7975
- CVE-2024-7976
- CVE-2024-7977
- CVE-2024-7978
- CVE-2024-7979
- CVE-2024-7980
- CVE-2024-7981
- CVE-2024-8033
- CVE-2024-8034
- CVE-2024-8035
- CVE-2024-38207
- CVE-2024-38209
- CVE-2024-38210
- CVE-2024-41879
Source
Related Link
- https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#august-22-2024
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38207
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38209
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38210
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41879
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7964
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7965
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7966
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7967
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7968
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7969
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7971
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7972
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7973
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7974
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7975
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7976
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7977
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7978
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7979
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7980
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7981
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8033
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8034
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-8035
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.