CVE-2025-49736: CWE-449: The UI Performs the Wrong Action in Microsoft Microsoft Edge for Android
The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-49736 is a vulnerability identified in Microsoft Edge for Android, specifically affecting version 1.0.0. The issue is categorized under CWE-449, which relates to the UI performing the wrong action. This vulnerability allows an unauthorized attacker to conduct spoofing attacks over a network by exploiting the browser's user interface behavior. In practice, this means that the UI may mislead users into believing they are interacting with legitimate content or controls, while in reality, the attacker manipulates the UI to perform unintended actions. The vulnerability does not require any privileges or prior authentication (PR:N), but it does require user interaction (UI:R), such as clicking or tapping on a spoofed element. The attack vector is network-based (AV:N), meaning the attacker can exploit this remotely without physical access to the device. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The impact primarily affects the integrity of user interactions (I:L), without compromising confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's root cause lies in the UI logic that incorrectly maps user actions to unintended functions, potentially leading users to perform actions they did not intend, such as navigating to malicious sites or executing harmful commands. This type of vulnerability is particularly dangerous in mobile browsers where screen size and UI constraints can make spoofing easier to execute and harder for users to detect.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on Microsoft Edge for Android as a primary browser for mobile workforce or customer-facing applications. The spoofing capability could be leveraged in phishing campaigns or targeted attacks to deceive users into divulging sensitive information or performing unauthorized actions. Although the vulnerability does not directly compromise confidentiality or availability, the integrity impact can lead to secondary consequences such as credential theft, unauthorized transactions, or installation of malware. Organizations in sectors with high mobile usage, such as financial services, healthcare, and government, may face increased risk due to the potential for social engineering combined with this UI flaw. Additionally, since the attack requires user interaction, awareness and training can mitigate some risk, but the inherent UI flaw means even cautious users could be tricked. The lack of a patch at the time of disclosure means organizations must rely on interim mitigations until an official fix is released.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement a multi-layered approach: 1) Enforce the use of updated browsers and monitor for patches from Microsoft, applying them promptly once available. 2) Deploy mobile device management (MDM) solutions to control browser versions and restrict installation of unapproved apps. 3) Educate users about the risks of interacting with suspicious links or UI elements, emphasizing caution with unexpected prompts or unusual browser behavior. 4) Utilize network-level protections such as DNS filtering and secure web gateways to block access to known malicious sites that could exploit this vulnerability. 5) Encourage the use of alternative browsers or platforms where feasible until the vulnerability is patched, especially for high-risk users. 6) Monitor network traffic and user reports for signs of spoofing or phishing attempts that may leverage this flaw. 7) Implement application-layer protections such as Content Security Policy (CSP) and browser security extensions that can help detect or prevent UI manipulation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-49736: CWE-449: The UI Performs the Wrong Action in Microsoft Microsoft Edge for Android
Description
The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-49736 is a vulnerability identified in Microsoft Edge for Android, specifically affecting version 1.0.0. The issue is categorized under CWE-449, which relates to the UI performing the wrong action. This vulnerability allows an unauthorized attacker to conduct spoofing attacks over a network by exploiting the browser's user interface behavior. In practice, this means that the UI may mislead users into believing they are interacting with legitimate content or controls, while in reality, the attacker manipulates the UI to perform unintended actions. The vulnerability does not require any privileges or prior authentication (PR:N), but it does require user interaction (UI:R), such as clicking or tapping on a spoofed element. The attack vector is network-based (AV:N), meaning the attacker can exploit this remotely without physical access to the device. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The impact primarily affects the integrity of user interactions (I:L), without compromising confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's root cause lies in the UI logic that incorrectly maps user actions to unintended functions, potentially leading users to perform actions they did not intend, such as navigating to malicious sites or executing harmful commands. This type of vulnerability is particularly dangerous in mobile browsers where screen size and UI constraints can make spoofing easier to execute and harder for users to detect.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on Microsoft Edge for Android as a primary browser for mobile workforce or customer-facing applications. The spoofing capability could be leveraged in phishing campaigns or targeted attacks to deceive users into divulging sensitive information or performing unauthorized actions. Although the vulnerability does not directly compromise confidentiality or availability, the integrity impact can lead to secondary consequences such as credential theft, unauthorized transactions, or installation of malware. Organizations in sectors with high mobile usage, such as financial services, healthcare, and government, may face increased risk due to the potential for social engineering combined with this UI flaw. Additionally, since the attack requires user interaction, awareness and training can mitigate some risk, but the inherent UI flaw means even cautious users could be tricked. The lack of a patch at the time of disclosure means organizations must rely on interim mitigations until an official fix is released.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement a multi-layered approach: 1) Enforce the use of updated browsers and monitor for patches from Microsoft, applying them promptly once available. 2) Deploy mobile device management (MDM) solutions to control browser versions and restrict installation of unapproved apps. 3) Educate users about the risks of interacting with suspicious links or UI elements, emphasizing caution with unexpected prompts or unusual browser behavior. 4) Utilize network-level protections such as DNS filtering and secure web gateways to block access to known malicious sites that could exploit this vulnerability. 5) Encourage the use of alternative browsers or platforms where feasible until the vulnerability is patched, especially for high-risk users. 6) Monitor network traffic and user reports for signs of spoofing or phishing attempts that may leverage this flaw. 7) Implement application-layer protections such as Content Security Policy (CSP) and browser security extensions that can help detect or prevent UI manipulation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-06-09T21:23:11.524Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689b7749ad5a09ad003490fd
Added to database: 8/12/2025, 5:18:01 PM
Last enriched: 9/4/2025, 1:00:02 AM
Last updated: 9/4/2025, 6:00:29 PM
Views: 5
Related Threats
CVE-2025-58361: CWE-20: Improper Input Validation in MarceloTessaro promptcraft-forge-studio
CriticalCVE-2025-58353: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MarceloTessaro promptcraft-forge-studio
HighCVE-2025-32322: Elevation of privilege in Google Android
HighCVE-2025-22415: Elevation of privilege in Google Android
HighCVE-2025-22414: Elevation of privilege in Google Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.