CVE-2025-49736: CWE-449: The UI Performs the Wrong Action in Microsoft Microsoft Edge for Android
The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-49736 is a vulnerability identified in Microsoft Edge for Android version 1.0.0, classified under CWE-449, which relates to the user interface performing incorrect actions. This flaw allows an unauthorized attacker to perform spoofing attacks over a network by exploiting the UI logic error. Specifically, the UI may misrepresent or misdirect user actions, causing users to unknowingly execute unintended commands or navigate to malicious content. The vulnerability does not require any privileges or authentication but does require user interaction, such as clicking or tapping on UI elements. The CVSS v3.1 base score is 4.3, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C. This means the attack can be launched remotely over the network with low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects the integrity of user actions, with no direct impact on confidentiality or availability. No known exploits have been reported in the wild as of the publication date (August 12, 2025). The vulnerability is currently unpatched, and no patch links are available yet. The issue arises from improper UI behavior that can mislead users into performing actions they did not intend, potentially enabling attackers to spoof legitimate UI elements or commands. This can facilitate phishing or social engineering attacks within the browser context on Android devices.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those with employees using Microsoft Edge on Android devices. The spoofing capability can lead to users being tricked into divulging sensitive information or executing unintended actions, potentially compromising data integrity or enabling further attacks such as credential theft or malware installation. While confidentiality and availability are not directly impacted, the integrity loss can cascade into broader security incidents. Organizations with mobile workforces or BYOD policies are particularly vulnerable. The risk is heightened in sectors with high security requirements such as finance, healthcare, and government, where spoofed UI actions could lead to unauthorized transactions or data manipulation. The lack of a patch increases exposure time, and the requirement for user interaction means that user awareness and training are critical. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
1. Monitor official Microsoft security advisories for patches addressing CVE-2025-49736 and apply updates promptly once available. 2. Until patches are released, restrict or limit the use of Microsoft Edge for Android in sensitive environments or on devices handling critical data. 3. Implement mobile device management (MDM) solutions to enforce browser usage policies and control app updates. 4. Educate users about the risk of spoofed UI elements and encourage vigilance when interacting with unexpected or suspicious browser prompts or actions. 5. Employ network-level protections such as DNS filtering and secure web gateways to block access to known malicious sites that could exploit this vulnerability. 6. Encourage the use of multi-factor authentication (MFA) to reduce the impact of potential credential theft resulting from spoofing. 7. Conduct regular security awareness training focusing on phishing and social engineering tactics that may leverage UI spoofing. 8. Consider alternative browsers with a strong security track record on Android until this vulnerability is resolved.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-49736: CWE-449: The UI Performs the Wrong Action in Microsoft Microsoft Edge for Android
Description
The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-49736 is a vulnerability identified in Microsoft Edge for Android version 1.0.0, classified under CWE-449, which relates to the user interface performing incorrect actions. This flaw allows an unauthorized attacker to perform spoofing attacks over a network by exploiting the UI logic error. Specifically, the UI may misrepresent or misdirect user actions, causing users to unknowingly execute unintended commands or navigate to malicious content. The vulnerability does not require any privileges or authentication but does require user interaction, such as clicking or tapping on UI elements. The CVSS v3.1 base score is 4.3, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C. This means the attack can be launched remotely over the network with low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects the integrity of user actions, with no direct impact on confidentiality or availability. No known exploits have been reported in the wild as of the publication date (August 12, 2025). The vulnerability is currently unpatched, and no patch links are available yet. The issue arises from improper UI behavior that can mislead users into performing actions they did not intend, potentially enabling attackers to spoof legitimate UI elements or commands. This can facilitate phishing or social engineering attacks within the browser context on Android devices.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those with employees using Microsoft Edge on Android devices. The spoofing capability can lead to users being tricked into divulging sensitive information or executing unintended actions, potentially compromising data integrity or enabling further attacks such as credential theft or malware installation. While confidentiality and availability are not directly impacted, the integrity loss can cascade into broader security incidents. Organizations with mobile workforces or BYOD policies are particularly vulnerable. The risk is heightened in sectors with high security requirements such as finance, healthcare, and government, where spoofed UI actions could lead to unauthorized transactions or data manipulation. The lack of a patch increases exposure time, and the requirement for user interaction means that user awareness and training are critical. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
1. Monitor official Microsoft security advisories for patches addressing CVE-2025-49736 and apply updates promptly once available. 2. Until patches are released, restrict or limit the use of Microsoft Edge for Android in sensitive environments or on devices handling critical data. 3. Implement mobile device management (MDM) solutions to enforce browser usage policies and control app updates. 4. Educate users about the risk of spoofed UI elements and encourage vigilance when interacting with unexpected or suspicious browser prompts or actions. 5. Employ network-level protections such as DNS filtering and secure web gateways to block access to known malicious sites that could exploit this vulnerability. 6. Encourage the use of multi-factor authentication (MFA) to reduce the impact of potential credential theft resulting from spoofing. 7. Conduct regular security awareness training focusing on phishing and social engineering tactics that may leverage UI spoofing. 8. Consider alternative browsers with a strong security track record on Android until this vulnerability is resolved.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-06-09T21:23:11.524Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689b7749ad5a09ad003490fd
Added to database: 8/12/2025, 5:18:01 PM
Last enriched: 2/14/2026, 10:35:49 AM
Last updated: 3/25/2026, 2:43:46 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.