Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49755: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge for Android

0
Medium
VulnerabilityCVE-2025-49755cvecve-2025-49755cwe-451
Published: Tue Aug 12 2025 (08/12/2025, 17:10:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge for Android

Description

User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 10/15/2025, 17:20:31 UTC

Technical Analysis

CVE-2025-49755 is a vulnerability classified under CWE-451, which pertains to user interface misrepresentation of critical information. This issue affects Microsoft Edge for Android version 1.0.0 and allows an unauthorized attacker to perform spoofing attacks over a network. The vulnerability arises because the browser can be manipulated to display falsified UI elements that misrepresent critical information to the user, potentially leading to deception. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R) to succeed. The scope is unchanged (S:U), and the impact is limited to integrity (I:L) with no impact on confidentiality or availability. The CVSS score of 4.3 reflects a medium severity, indicating moderate risk. No patches or exploits are currently known, but the vulnerability could be exploited in phishing or social engineering campaigns to trick users into taking harmful actions or disclosing sensitive information. The lack of authentication requirements and ease of exploitation over a network make it a concern for mobile users, especially in environments where Microsoft Edge is widely deployed on Android devices.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of user interactions and trust in web content viewed via Microsoft Edge on Android devices. Attackers could exploit this flaw to conduct phishing attacks or deliver misleading information, potentially leading to credential theft, unauthorized transactions, or installation of malicious software. Sectors such as finance, government, and critical infrastructure, which rely heavily on secure communications and user trust, could be particularly impacted. The vulnerability does not directly compromise confidentiality or availability but undermines user confidence and can facilitate further attacks. Given the widespread use of Android devices and Microsoft Edge in Europe, the threat could affect a significant number of users, especially mobile workforce and remote employees. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

Organizations should implement targeted mitigation strategies including: 1) Educating users about the risks of UI spoofing and encouraging vigilance when interacting with unexpected or suspicious browser prompts or content. 2) Monitoring network traffic for anomalies that could indicate spoofing attempts or man-in-the-middle activities. 3) Deploying mobile device management (MDM) solutions to enforce security policies and restrict installation of untrusted applications. 4) Encouraging users to update Microsoft Edge for Android promptly once a patch is released by Microsoft. 5) Utilizing browser security features such as HTTPS enforcement and certificate pinning to reduce the risk of network-based spoofing. 6) Conducting regular security awareness training focused on phishing and social engineering tactics that could leverage this vulnerability. 7) Collaborating with IT teams to monitor for unusual user behavior or access patterns that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T22:49:37.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774aad5a09ad00349113

Added to database: 8/12/2025, 5:18:02 PM

Last enriched: 10/15/2025, 5:20:31 PM

Last updated: 10/16/2025, 7:12:42 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats