Skip to main content

CVE-2024-21423: CWE-693: Protection Mechanism Failure in Microsoft Microsoft Edge (Chromium-based)

Medium
VulnerabilityCVE-2024-21423cvecve-2024-21423cwe-693
Published: Fri Feb 23 2024 (02/23/2024, 21:35:08 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Edge (Chromium-based)

Description

Microsoft Edge (Chromium-based) Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 07:52:30 UTC

Technical Analysis

CVE-2024-21423 is a medium-severity vulnerability identified in the Chromium-based Microsoft Edge browser, categorized under CWE-693 (Protection Mechanism Failure). This vulnerability relates to an information disclosure flaw, meaning that an attacker could potentially gain access to sensitive information that should otherwise be protected. The vulnerability affects version 1.0.0 of Microsoft Edge (Chromium-based). The CVSS 3.1 base score is 4.8, indicating a medium impact level. The vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C reveals that the attack vector is network-based (AV:N), but requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is low on confidentiality and integrity (C:L/I:L), with no impact on availability (A:N). The exploit code maturity is official (E:U), remediation level is official fix available (RL:O), and report confidence is confirmed (RC:C). Although no known exploits are currently in the wild, the vulnerability represents a failure in protection mechanisms that could allow attackers to extract limited sensitive information remotely without user interaction or privileges. The lack of a patch link in the provided data suggests that users should verify the latest updates from Microsoft to ensure remediation. This vulnerability is significant because Microsoft Edge is widely used in enterprise and consumer environments, and information disclosure can lead to further targeted attacks or privacy violations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily through potential leakage of sensitive information via the widely deployed Microsoft Edge browser. While the impact on confidentiality and integrity is rated low, even limited information disclosure can aid attackers in reconnaissance or in crafting more sophisticated attacks. Organizations handling sensitive data, such as financial institutions, healthcare providers, and government agencies, could be at risk of indirect consequences if attackers leverage disclosed information for lateral movement or social engineering. The medium severity and network attack vector mean that attackers could exploit this vulnerability remotely without user interaction, increasing the risk surface. However, the high attack complexity reduces the likelihood of widespread exploitation. Still, given the extensive use of Microsoft Edge across European enterprises and public sector entities, the vulnerability warrants prompt attention to prevent potential data leaks and maintain compliance with data protection regulations such as GDPR.

Mitigation Recommendations

European organizations should immediately verify that their Microsoft Edge installations are updated to the latest version where this vulnerability is patched. Since no direct patch link was provided, organizations should monitor official Microsoft security advisories and deploy updates as soon as they become available. Network-level mitigations include restricting access to internal or sensitive web resources via Edge from untrusted networks and employing web filtering or endpoint protection solutions that can detect anomalous browser behavior. Additionally, organizations should conduct regular browser security assessments and educate users about safe browsing practices. Implementing strict Content Security Policies (CSP) and disabling unnecessary browser extensions can reduce the attack surface. Monitoring network traffic for unusual patterns related to browser activity can also help detect exploitation attempts. Finally, integrating vulnerability management processes to track and remediate browser vulnerabilities promptly is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:21.301Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeacb8

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 7:52:30 AM

Last updated: 8/16/2025, 7:25:28 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats