Skip to main content

CVE-2025-49755: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge for Android

Medium
VulnerabilityCVE-2025-49755cvecve-2025-49755cwe-451
Published: Tue Aug 12 2025 (08/12/2025, 17:10:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge for Android

Description

User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 09/04/2025, 01:00:14 UTC

Technical Analysis

CVE-2025-49755 is a vulnerability identified in Microsoft Edge for Android, specifically version 1.0.0. It is classified under CWE-451, which pertains to User Interface (UI) Misrepresentation of Critical Information. This vulnerability allows an unauthorized attacker to perform spoofing attacks over a network by manipulating the UI to misrepresent critical information to the user. The flaw does not require any privileges or authentication (PR:N), but it does require user interaction (UI:R) to be exploited. The attack vector is network-based (AV:N), meaning the attacker can exploit this vulnerability remotely without physical access to the device. The vulnerability impacts the integrity of the application by misleading users, potentially causing them to make security decisions based on falsified information. However, it does not affect confidentiality or availability directly. The CVSS v3.1 base score is 4.3, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could be leveraged in phishing or social engineering attacks where the attacker spoofs UI elements such as URLs, security indicators, or other critical browser information to trick users into divulging sensitive data or performing unsafe actions.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in scenarios where employees or users rely on Microsoft Edge for Android for accessing corporate resources or sensitive information. The spoofing capability could be exploited to conduct targeted phishing campaigns or man-in-the-middle attacks, potentially leading to credential theft, unauthorized access, or data manipulation. Since the vulnerability affects the UI representation, users might be deceived into trusting malicious websites or downloads, increasing the risk of malware infections or data breaches. The impact is particularly significant for sectors with high regulatory requirements such as finance, healthcare, and government institutions within Europe, where data integrity and user trust are paramount. Additionally, mobile device usage is widespread in European enterprises, making this vulnerability relevant for remote workforces and mobile-first environments. Although the vulnerability does not directly compromise confidentiality or availability, the indirect consequences of successful spoofing could lead to significant operational and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Ensure that all devices running Microsoft Edge for Android are updated to the latest version as soon as patches become available from Microsoft. 2) Implement mobile device management (MDM) solutions to enforce timely updates and restrict installation of unapproved applications. 3) Educate users about the risks of UI spoofing attacks and train them to verify URLs and security indicators carefully before entering sensitive information. 4) Employ network security controls such as DNS filtering and secure web gateways to block access to known malicious sites that could exploit this vulnerability. 5) Monitor network traffic for unusual patterns that may indicate phishing or spoofing attempts targeting mobile browsers. 6) Encourage the use of multi-factor authentication (MFA) to reduce the impact of credential theft resulting from spoofing attacks. 7) Consider deploying endpoint detection and response (EDR) solutions capable of identifying suspicious browser behavior on mobile devices. These measures, combined with vigilant patch management, will reduce the risk posed by this UI misrepresentation vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T22:49:37.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774aad5a09ad00349113

Added to database: 8/12/2025, 5:18:02 PM

Last enriched: 9/4/2025, 1:00:14 AM

Last updated: 9/4/2025, 10:23:11 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats