Skip to main content

CVE-2025-49736: CWE-449: The UI Performs the Wrong Action in Microsoft Microsoft Edge for Android

Medium
VulnerabilityCVE-2025-49736cvecve-2025-49736cwe-449
Published: Tue Aug 12 2025 (08/12/2025, 17:10:48 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge for Android

Description

The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 09/04/2025, 01:00:02 UTC

Technical Analysis

CVE-2025-49736 is a vulnerability identified in Microsoft Edge for Android, specifically affecting version 1.0.0. The issue is categorized under CWE-449, which relates to the UI performing the wrong action. This vulnerability allows an unauthorized attacker to conduct spoofing attacks over a network by exploiting the browser's user interface behavior. In practice, this means that the UI may mislead users into believing they are interacting with legitimate content or controls, while in reality, the attacker manipulates the UI to perform unintended actions. The vulnerability does not require any privileges or prior authentication (PR:N), but it does require user interaction (UI:R), such as clicking or tapping on a spoofed element. The attack vector is network-based (AV:N), meaning the attacker can exploit this remotely without physical access to the device. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The impact primarily affects the integrity of user interactions (I:L), without compromising confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's root cause lies in the UI logic that incorrectly maps user actions to unintended functions, potentially leading users to perform actions they did not intend, such as navigating to malicious sites or executing harmful commands. This type of vulnerability is particularly dangerous in mobile browsers where screen size and UI constraints can make spoofing easier to execute and harder for users to detect.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially for those relying on Microsoft Edge for Android as a primary browser for mobile workforce or customer-facing applications. The spoofing capability could be leveraged in phishing campaigns or targeted attacks to deceive users into divulging sensitive information or performing unauthorized actions. Although the vulnerability does not directly compromise confidentiality or availability, the integrity impact can lead to secondary consequences such as credential theft, unauthorized transactions, or installation of malware. Organizations in sectors with high mobile usage, such as financial services, healthcare, and government, may face increased risk due to the potential for social engineering combined with this UI flaw. Additionally, since the attack requires user interaction, awareness and training can mitigate some risk, but the inherent UI flaw means even cautious users could be tricked. The lack of a patch at the time of disclosure means organizations must rely on interim mitigations until an official fix is released.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement a multi-layered approach: 1) Enforce the use of updated browsers and monitor for patches from Microsoft, applying them promptly once available. 2) Deploy mobile device management (MDM) solutions to control browser versions and restrict installation of unapproved apps. 3) Educate users about the risks of interacting with suspicious links or UI elements, emphasizing caution with unexpected prompts or unusual browser behavior. 4) Utilize network-level protections such as DNS filtering and secure web gateways to block access to known malicious sites that could exploit this vulnerability. 5) Encourage the use of alternative browsers or platforms where feasible until the vulnerability is patched, especially for high-risk users. 6) Monitor network traffic and user reports for signs of spoofing or phishing attempts that may leverage this flaw. 7) Implement application-layer protections such as Content Security Policy (CSP) and browser security extensions that can help detect or prevent UI manipulation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T21:23:11.524Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b7749ad5a09ad003490fd

Added to database: 8/12/2025, 5:18:01 PM

Last enriched: 9/4/2025, 1:00:02 AM

Last updated: 9/4/2025, 6:00:29 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats