Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-26196: CWE-259: Use of Hard-coded Password in Microsoft Microsoft Edge for Android

0
Medium
VulnerabilityCVE-2024-26196cvecve-2024-26196cwe-259
Published: Thu Feb 29 2024 (02/29/2024, 20:27:10 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Edge for Android

Description

Microsoft Edge for Android (Chromium-based) Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 07:51:55 UTC

Technical Analysis

CVE-2024-26196 is a medium-severity vulnerability identified in Microsoft Edge for Android, specifically version 1.0.0. The issue is classified under CWE-259, which denotes the use of hard-coded passwords within the software. This vulnerability allows an attacker to potentially gain unauthorized access to sensitive information due to the presence of a hard-coded password embedded in the application code. The vulnerability is an information disclosure type, meaning it could expose confidential data without necessarily impacting the integrity or availability of the system. The CVSS 3.1 base score is 4.3, reflecting a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C) indicates that the attack can be performed remotely over the network without privileges and with low attack complexity. However, user interaction is required, and the impact is limited to confidentiality with no effect on integrity or availability. The vulnerability is publicly disclosed but currently has no known exploits in the wild, and no patches have been linked yet. The presence of a hard-coded password in a widely used browser on Android devices could allow attackers to extract sensitive information or bypass certain security controls, particularly if the password grants access to privileged functions or stored data within the browser context.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to employees and users who utilize Microsoft Edge on Android devices. Since browsers are a primary interface for accessing corporate resources, any information disclosure could lead to leakage of sensitive corporate data, session tokens, or credentials stored or cached by the browser. This could facilitate further attacks such as phishing, session hijacking, or lateral movement within corporate networks. The impact is heightened in sectors with strict data protection requirements like finance, healthcare, and government institutions. Additionally, the requirement for user interaction means that social engineering or phishing campaigns could be used to exploit this vulnerability. The medium severity rating suggests that while the vulnerability is not critical, it still represents a tangible risk that could undermine confidentiality and trust in corporate mobile device usage policies.

Mitigation Recommendations

European organizations should prioritize updating Microsoft Edge for Android to the latest version once a patch is released by Microsoft. Until then, organizations should implement mobile device management (MDM) policies to restrict the use of vulnerable browser versions on corporate devices. User education is critical to reduce the risk of social engineering attacks that might trigger exploitation. Network-level protections such as web filtering and anomaly detection can help identify suspicious activities related to this vulnerability. Additionally, organizations should audit and limit the storage of sensitive information within browsers and encourage the use of secure password managers instead of relying on browser-stored credentials. Monitoring for unusual data access patterns on Android devices can also help detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-02-14T22:23:54.100Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeacd0

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 7:51:55 AM

Last updated: 10/15/2025, 10:35:30 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats