Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49736: CWE-449: The UI Performs the Wrong Action in Microsoft Microsoft Edge for Android

0
Medium
VulnerabilityCVE-2025-49736cvecve-2025-49736cwe-449
Published: Tue Aug 12 2025 (08/12/2025, 17:10:48 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge for Android

Description

The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:35:49 UTC

Technical Analysis

CVE-2025-49736 is a vulnerability identified in Microsoft Edge for Android version 1.0.0, classified under CWE-449, which relates to the user interface performing incorrect actions. This flaw allows an unauthorized attacker to perform spoofing attacks over a network by exploiting the UI logic error. Specifically, the UI may misrepresent or misdirect user actions, causing users to unknowingly execute unintended commands or navigate to malicious content. The vulnerability does not require any privileges or authentication but does require user interaction, such as clicking or tapping on UI elements. The CVSS v3.1 base score is 4.3, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C. This means the attack can be launched remotely over the network with low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects the integrity of user actions, with no direct impact on confidentiality or availability. No known exploits have been reported in the wild as of the publication date (August 12, 2025). The vulnerability is currently unpatched, and no patch links are available yet. The issue arises from improper UI behavior that can mislead users into performing actions they did not intend, potentially enabling attackers to spoof legitimate UI elements or commands. This can facilitate phishing or social engineering attacks within the browser context on Android devices.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially for those with employees using Microsoft Edge on Android devices. The spoofing capability can lead to users being tricked into divulging sensitive information or executing unintended actions, potentially compromising data integrity or enabling further attacks such as credential theft or malware installation. While confidentiality and availability are not directly impacted, the integrity loss can cascade into broader security incidents. Organizations with mobile workforces or BYOD policies are particularly vulnerable. The risk is heightened in sectors with high security requirements such as finance, healthcare, and government, where spoofed UI actions could lead to unauthorized transactions or data manipulation. The lack of a patch increases exposure time, and the requirement for user interaction means that user awareness and training are critical. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation.

Mitigation Recommendations

1. Monitor official Microsoft security advisories for patches addressing CVE-2025-49736 and apply updates promptly once available. 2. Until patches are released, restrict or limit the use of Microsoft Edge for Android in sensitive environments or on devices handling critical data. 3. Implement mobile device management (MDM) solutions to enforce browser usage policies and control app updates. 4. Educate users about the risk of spoofed UI elements and encourage vigilance when interacting with unexpected or suspicious browser prompts or actions. 5. Employ network-level protections such as DNS filtering and secure web gateways to block access to known malicious sites that could exploit this vulnerability. 6. Encourage the use of multi-factor authentication (MFA) to reduce the impact of potential credential theft resulting from spoofing. 7. Conduct regular security awareness training focusing on phishing and social engineering tactics that may leverage UI spoofing. 8. Consider alternative browsers with a strong security track record on Android until this vulnerability is resolved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T21:23:11.524Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b7749ad5a09ad003490fd

Added to database: 8/12/2025, 5:18:01 PM

Last enriched: 2/14/2026, 10:35:49 AM

Last updated: 3/25/2026, 2:43:46 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses