Skip to main content

CVE-2024-26246: CWE-1220: Insufficient Granularity of Access Control in Microsoft Microsoft Edge for Android

Low
VulnerabilityCVE-2024-26246cvecve-2024-26246cwe-1220
Published: Thu Mar 14 2024 (03/14/2024, 22:13:03 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Edge for Android

Description

Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 05:57:12 UTC

Technical Analysis

CVE-2024-26246 is a security feature bypass vulnerability identified in Microsoft Edge for Android, specifically in version 1.0.0. The vulnerability is categorized under CWE-1220, which refers to insufficient granularity of access control. This means that the browser's security mechanisms do not adequately restrict access to certain resources or functionalities, potentially allowing an attacker to bypass intended security controls. The vulnerability is described as a security feature bypass, indicating that it does not directly lead to code execution or data corruption but allows circumvention of security policies that protect sensitive information or restrict certain actions within the browser environment. The CVSS 3.1 base score is 3.9, which is considered low severity. The vector string (CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C) reveals that the attack requires physical access to the device (AV:P), low attack complexity (AC:L), high privileges (PR:H), and user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity (I:N) or availability (A:N). The exploitability is official (RL:O) and confirmed (RC:C). No known exploits are currently in the wild, and no patches have been released yet. The vulnerability affects only the initial release version 1.0.0 of Microsoft Edge for Android, which is Chromium-based. The issue likely involves improper enforcement of access controls within the browser, potentially allowing an attacker with high privileges and physical access to bypass security features and access confidential data or resources that should be restricted. However, the requirement for high privileges and user interaction limits the attack surface and reduces the likelihood of remote exploitation or widespread impact.

Potential Impact

For European organizations, the impact of this vulnerability is relatively limited due to the low CVSS score and the requirement for physical access and high privileges on the affected device. However, in environments where sensitive data is accessed via Microsoft Edge on Android devices, such as corporate mobile devices or BYOD scenarios, this vulnerability could allow an insider or attacker with physical access to bypass security controls and access confidential information. This could lead to data leakage or unauthorized disclosure of sensitive corporate or personal data. The lack of impact on integrity and availability means that the vulnerability does not allow modification or disruption of data or services, limiting the scope of damage. Nonetheless, organizations with strict data protection requirements, such as those in finance, healthcare, or government sectors, should consider this vulnerability seriously as it undermines confidentiality protections. The requirement for user interaction and high privileges reduces the risk of remote exploitation, but social engineering or insider threats could still leverage this vulnerability. Given the increasing use of mobile devices for accessing corporate resources in Europe, particularly in countries with high mobile workforce penetration, the vulnerability could be exploited in targeted attacks against high-value individuals or devices.

Mitigation Recommendations

1. Limit the use of Microsoft Edge for Android version 1.0.0 in sensitive environments until a patch is released. Consider deploying alternative browsers with stronger access control enforcement on Android devices. 2. Enforce strict device access controls, including strong authentication and physical security measures, to prevent unauthorized physical access to mobile devices. 3. Implement mobile device management (MDM) solutions to monitor and control browser versions and enforce security policies on corporate Android devices. 4. Educate users about the risks of social engineering and the importance of not granting high privileges or performing risky actions when prompted by the browser or other apps. 5. Monitor for unusual access patterns or data exfiltration attempts from Android devices running Microsoft Edge, especially those with high privilege users. 6. Prepare to deploy patches or updates from Microsoft promptly once available, and test them in controlled environments before wide deployment. 7. Restrict installation of unapproved applications and enforce least privilege principles on mobile devices to reduce the risk of privilege escalation that could facilitate exploitation. 8. Consider network-level controls to limit sensitive data access from mobile browsers, such as conditional access policies or VPN requirements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-02-15T00:57:49.361Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeb1c8

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 5:57:12 AM

Last updated: 8/18/2025, 11:32:14 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats