CVE-2024-26246: CWE-1220: Insufficient Granularity of Access Control in Microsoft Microsoft Edge for Android
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
AI Analysis
Technical Summary
CVE-2024-26246 is a security feature bypass vulnerability identified in Microsoft Edge for Android, specifically in version 1.0.0. The vulnerability is categorized under CWE-1220, which refers to insufficient granularity of access control. This means that the browser's security mechanisms do not adequately restrict access to certain resources or functionalities, potentially allowing an attacker to bypass intended security controls. The vulnerability is described as a security feature bypass, indicating that it does not directly lead to code execution or data corruption but allows circumvention of security policies that protect sensitive information or restrict certain actions within the browser environment. The CVSS 3.1 base score is 3.9, which is considered low severity. The vector string (CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C) reveals that the attack requires physical access to the device (AV:P), low attack complexity (AC:L), high privileges (PR:H), and user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity (I:N) or availability (A:N). The exploitability is official (RL:O) and confirmed (RC:C). No known exploits are currently in the wild, and no patches have been released yet. The vulnerability affects only the initial release version 1.0.0 of Microsoft Edge for Android, which is Chromium-based. The issue likely involves improper enforcement of access controls within the browser, potentially allowing an attacker with high privileges and physical access to bypass security features and access confidential data or resources that should be restricted. However, the requirement for high privileges and user interaction limits the attack surface and reduces the likelihood of remote exploitation or widespread impact.
Potential Impact
For European organizations, the impact of this vulnerability is relatively limited due to the low CVSS score and the requirement for physical access and high privileges on the affected device. However, in environments where sensitive data is accessed via Microsoft Edge on Android devices, such as corporate mobile devices or BYOD scenarios, this vulnerability could allow an insider or attacker with physical access to bypass security controls and access confidential information. This could lead to data leakage or unauthorized disclosure of sensitive corporate or personal data. The lack of impact on integrity and availability means that the vulnerability does not allow modification or disruption of data or services, limiting the scope of damage. Nonetheless, organizations with strict data protection requirements, such as those in finance, healthcare, or government sectors, should consider this vulnerability seriously as it undermines confidentiality protections. The requirement for user interaction and high privileges reduces the risk of remote exploitation, but social engineering or insider threats could still leverage this vulnerability. Given the increasing use of mobile devices for accessing corporate resources in Europe, particularly in countries with high mobile workforce penetration, the vulnerability could be exploited in targeted attacks against high-value individuals or devices.
Mitigation Recommendations
1. Limit the use of Microsoft Edge for Android version 1.0.0 in sensitive environments until a patch is released. Consider deploying alternative browsers with stronger access control enforcement on Android devices. 2. Enforce strict device access controls, including strong authentication and physical security measures, to prevent unauthorized physical access to mobile devices. 3. Implement mobile device management (MDM) solutions to monitor and control browser versions and enforce security policies on corporate Android devices. 4. Educate users about the risks of social engineering and the importance of not granting high privileges or performing risky actions when prompted by the browser or other apps. 5. Monitor for unusual access patterns or data exfiltration attempts from Android devices running Microsoft Edge, especially those with high privilege users. 6. Prepare to deploy patches or updates from Microsoft promptly once available, and test them in controlled environments before wide deployment. 7. Restrict installation of unapproved applications and enforce least privilege principles on mobile devices to reduce the risk of privilege escalation that could facilitate exploitation. 8. Consider network-level controls to limit sensitive data access from mobile browsers, such as conditional access policies or VPN requirements.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2024-26246: CWE-1220: Insufficient Granularity of Access Control in Microsoft Microsoft Edge for Android
Description
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-26246 is a security feature bypass vulnerability identified in Microsoft Edge for Android, specifically in version 1.0.0. The vulnerability is categorized under CWE-1220, which refers to insufficient granularity of access control. This means that the browser's security mechanisms do not adequately restrict access to certain resources or functionalities, potentially allowing an attacker to bypass intended security controls. The vulnerability is described as a security feature bypass, indicating that it does not directly lead to code execution or data corruption but allows circumvention of security policies that protect sensitive information or restrict certain actions within the browser environment. The CVSS 3.1 base score is 3.9, which is considered low severity. The vector string (CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C) reveals that the attack requires physical access to the device (AV:P), low attack complexity (AC:L), high privileges (PR:H), and user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity (I:N) or availability (A:N). The exploitability is official (RL:O) and confirmed (RC:C). No known exploits are currently in the wild, and no patches have been released yet. The vulnerability affects only the initial release version 1.0.0 of Microsoft Edge for Android, which is Chromium-based. The issue likely involves improper enforcement of access controls within the browser, potentially allowing an attacker with high privileges and physical access to bypass security features and access confidential data or resources that should be restricted. However, the requirement for high privileges and user interaction limits the attack surface and reduces the likelihood of remote exploitation or widespread impact.
Potential Impact
For European organizations, the impact of this vulnerability is relatively limited due to the low CVSS score and the requirement for physical access and high privileges on the affected device. However, in environments where sensitive data is accessed via Microsoft Edge on Android devices, such as corporate mobile devices or BYOD scenarios, this vulnerability could allow an insider or attacker with physical access to bypass security controls and access confidential information. This could lead to data leakage or unauthorized disclosure of sensitive corporate or personal data. The lack of impact on integrity and availability means that the vulnerability does not allow modification or disruption of data or services, limiting the scope of damage. Nonetheless, organizations with strict data protection requirements, such as those in finance, healthcare, or government sectors, should consider this vulnerability seriously as it undermines confidentiality protections. The requirement for user interaction and high privileges reduces the risk of remote exploitation, but social engineering or insider threats could still leverage this vulnerability. Given the increasing use of mobile devices for accessing corporate resources in Europe, particularly in countries with high mobile workforce penetration, the vulnerability could be exploited in targeted attacks against high-value individuals or devices.
Mitigation Recommendations
1. Limit the use of Microsoft Edge for Android version 1.0.0 in sensitive environments until a patch is released. Consider deploying alternative browsers with stronger access control enforcement on Android devices. 2. Enforce strict device access controls, including strong authentication and physical security measures, to prevent unauthorized physical access to mobile devices. 3. Implement mobile device management (MDM) solutions to monitor and control browser versions and enforce security policies on corporate Android devices. 4. Educate users about the risks of social engineering and the importance of not granting high privileges or performing risky actions when prompted by the browser or other apps. 5. Monitor for unusual access patterns or data exfiltration attempts from Android devices running Microsoft Edge, especially those with high privilege users. 6. Prepare to deploy patches or updates from Microsoft promptly once available, and test them in controlled environments before wide deployment. 7. Restrict installation of unapproved applications and enforce least privilege principles on mobile devices to reduce the risk of privilege escalation that could facilitate exploitation. 8. Consider network-level controls to limit sensitive data access from mobile browsers, such as conditional access policies or VPN requirements.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-02-15T00:57:49.361Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9836c4522896dcbeb1c8
Added to database: 5/21/2025, 9:09:10 AM
Last enriched: 6/26/2025, 5:57:12 AM
Last updated: 8/18/2025, 11:32:14 PM
Views: 15
Related Threats
CVE-2025-57788: CWE-259: Use of Hard-coded Password in Commvault CommCell
MediumCVE-2025-57791: CWE-88: Improper Neutralization of Argument Delimiters in a Command in Commvault CommCell
MediumCVE-2025-57790: CWE-36: Absolute Path Traversal in Commvault CommCell
HighCVE-2025-57789: CWE-257: Storing Passwords in a Recoverable Format in Commvault CommCell
MediumCVE-2025-54364: CWE-1333 Inefficient Regular Expression Complexity in Microsoft Knack
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.