Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21399: CWE-426: Untrusted Search Path in Microsoft Microsoft Edge Update Setup

0
High
VulnerabilityCVE-2025-21399cvecve-2025-21399cwe-426
Published: Fri Jan 17 2025 (01/17/2025, 19:19:49 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge Update Setup

Description

Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:32:29 UTC

Technical Analysis

CVE-2025-21399 is a vulnerability classified under CWE-426 (Untrusted Search Path) affecting Microsoft Edge Update Setup version 1.0.0.0. This flaw arises because the update setup process searches for executables or DLLs in directories that can be influenced by an attacker, allowing them to place malicious files that the updater will execute with elevated privileges. The vulnerability enables a local attacker without authentication to escalate privileges on the affected system, potentially gaining SYSTEM-level access. The attack complexity is high, meaning exploitation requires specific conditions or knowledge, but no user interaction is needed. The vulnerability impacts confidentiality, integrity, and availability since an attacker could run arbitrary code, install persistent malware, or disrupt update processes. Although no public exploits are known, the presence of this vulnerability in a widely deployed component like Microsoft Edge Update Setup makes it a significant risk. The CVSS 3.1 vector (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates local attack vector, high complexity, no privileges or user interaction required, unchanged scope, and high impact on confidentiality, integrity, and availability. The vulnerability was published on January 17, 2025, with no patches currently listed, emphasizing the need for proactive mitigation.

Potential Impact

For European organizations, the impact of CVE-2025-21399 could be substantial, especially in enterprises with extensive Microsoft Edge deployments on Windows systems. Successful exploitation allows attackers to gain elevated privileges locally, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of business operations, and the installation of persistent malware or ransomware. Critical infrastructure sectors such as finance, healthcare, and government agencies in Europe could face severe operational and reputational damage. The vulnerability's local attack vector limits remote exploitation but insider threats or attackers with initial footholds could leverage this flaw to escalate privileges. The lack of known exploits currently reduces immediate risk but also means organizations must be vigilant to prevent future exploitation. The high impact on confidentiality, integrity, and availability underscores the threat to data protection and system reliability under European data protection regulations like GDPR.

Mitigation Recommendations

European organizations should implement several specific mitigations beyond generic patching advice: 1) Restrict write permissions on directories and paths used by Microsoft Edge Update Setup to prevent unauthorized file placement. 2) Employ application whitelisting and code integrity policies to block execution of unauthorized binaries or DLLs. 3) Use endpoint detection and response (EDR) tools to monitor for suspicious local file modifications or privilege escalation attempts related to Edge update processes. 4) Enforce the principle of least privilege for user accounts to limit local attacker capabilities. 5) Regularly audit and harden local system configurations to reduce the attack surface for untrusted search path vulnerabilities. 6) Stay updated with Microsoft security advisories for patches or workarounds and apply them promptly once available. 7) Conduct user awareness training to reduce insider threat risks. These targeted actions help mitigate exploitation risks while awaiting official patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.375Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6852d15033c7acc046ee0911

Added to database: 6/18/2025, 2:46:40 PM

Last enriched: 2/14/2026, 8:32:29 AM

Last updated: 3/23/2026, 8:53:12 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses