Skip to main content

CVE-2024-21387: CWE-357: Insufficient UI Warning of Dangerous Operations in Microsoft Microsoft Edge (Chromium-based)

Medium
VulnerabilityCVE-2024-21387cvecve-2024-21387cwe-357
Published: Fri Jan 26 2024 (01/26/2024, 00:29:32 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Edge (Chromium-based)

Description

Microsoft Edge for Android Spoofing Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:06:44 UTC

Technical Analysis

CVE-2024-21387 is a medium-severity vulnerability identified in the Microsoft Edge browser for Android, specifically the Chromium-based version 1.0.0. The vulnerability is classified under CWE-357, which refers to 'Insufficient UI Warning of Dangerous Operations.' This means that the browser's user interface does not adequately warn users when they are about to perform potentially dangerous or spoofed operations. In this context, the vulnerability enables spoofing attacks where malicious actors can deceive users by presenting misleading UI elements or content, potentially tricking them into performing unintended actions or divulging sensitive information. The CVSS 3.1 base score of 5.3 reflects a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to integrity (I:L) with no confidentiality or availability impact. The scope remains unchanged (S:U), and the exploitability and remediation levels are official and confirmed, respectively. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability primarily affects the Android version of Microsoft Edge, which is widely used on mobile devices, making it a concern for mobile users who may be targeted through malicious websites or phishing attempts that exploit UI spoofing to mislead users.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to employees and users who rely on Microsoft Edge on Android devices for web browsing. The spoofing vulnerability could be leveraged in targeted phishing campaigns or social engineering attacks to trick users into executing harmful actions, such as entering credentials on fake login pages or approving malicious transactions. Although the vulnerability does not directly compromise confidentiality or availability, the integrity impact could lead to unauthorized actions or misinformation, potentially resulting in credential theft or unauthorized access to internal systems. This risk is heightened in sectors with high mobile workforce usage, such as finance, government, and critical infrastructure, where trust in browser UI is essential. The lack of required user interaction for exploitation increases the threat level, as users may be unaware of the spoofing attempt. However, the absence of known exploits in the wild and the medium severity rating suggest that the immediate risk is moderate but should not be ignored, especially given the increasing reliance on mobile browsers in professional environments.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy beyond generic advice: 1) Enforce the use of updated browsers by monitoring and managing mobile device software versions through Mobile Device Management (MDM) solutions, ensuring that users upgrade to patched versions once available. 2) Educate users specifically about UI spoofing risks, emphasizing vigilance when interacting with unexpected prompts or unusual browser behavior on mobile devices. 3) Deploy advanced endpoint protection on mobile devices that can detect and block phishing and spoofing attempts at the network or application level. 4) Utilize network-level protections such as DNS filtering and secure web gateways to block access to known malicious sites that could exploit this vulnerability. 5) Encourage the use of multi-factor authentication (MFA) to mitigate the impact of credential theft resulting from spoofing attacks. 6) Monitor for unusual user behavior or access patterns that could indicate successful exploitation. 7) Coordinate with Microsoft and subscribe to security advisories to promptly apply patches once released, as no patch is currently linked. These steps will reduce the attack surface and limit the potential damage from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:20.453Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeabf8

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:06:44 AM

Last updated: 8/15/2025, 10:05:48 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats