Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49755: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge for Android

0
Medium
VulnerabilityCVE-2025-49755cvecve-2025-49755cwe-451
Published: Tue Aug 12 2025 (08/12/2025, 17:10:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge for Android

Description

User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 11/14/2025, 06:27:29 UTC

Technical Analysis

CVE-2025-49755 is a vulnerability classified under CWE-451, indicating a user interface misrepresentation issue in Microsoft Edge for Android version 1.0.0. This flaw allows an unauthorized attacker to conduct spoofing attacks by manipulating the browser's UI to misrepresent critical information to the user. The vulnerability is exploitable remotely over a network without requiring any privileges, but it does require user interaction, such as clicking on a crafted link or visiting a malicious website. The misrepresentation can cause users to trust fraudulent content, potentially leading to phishing or social engineering attacks. The CVSS 3.1 base score is 4.3 (medium), reflecting that while confidentiality and availability are not impacted, the integrity of displayed information can be compromised. No known exploits are currently in the wild, and no patches have been released yet. The vulnerability was reserved in June 2025 and published in August 2025. The attack vector is network-based with low complexity and no privileges required, but user interaction is necessary. This vulnerability highlights the risks of UI spoofing in mobile browsers, which can undermine user trust and facilitate further attacks.

Potential Impact

For European organizations, this vulnerability could enable attackers to conduct phishing or social engineering campaigns by spoofing critical UI elements in Microsoft Edge for Android. This may lead to credential theft, unauthorized transactions, or the installation of malware if users are deceived by the spoofed interface. Although the vulnerability does not directly compromise data confidentiality or system availability, the integrity of user decisions based on UI information is at risk. Organizations relying on Microsoft Edge for Android for secure browsing or internal applications may face increased risk of targeted attacks. The impact is particularly relevant for sectors with high mobile workforce usage, such as finance, government, and critical infrastructure. The lack of known exploits reduces immediate risk, but the potential for future exploitation necessitates proactive measures. The medium severity suggests that while the threat is not critical, it should not be ignored, especially in environments where user trust in browser UI is essential for security.

Mitigation Recommendations

1. Monitor Microsoft’s security advisories closely and apply patches immediately once available to address CVE-2025-49755. 2. Educate users on recognizing suspicious UI behavior and the risks of clicking unknown or untrusted links, especially on mobile devices. 3. Implement network-level protections such as web filtering and intrusion detection systems to block access to known malicious sites that could exploit this vulnerability. 4. Encourage the use of multi-factor authentication (MFA) to reduce the impact of credential theft resulting from spoofing attacks. 5. Consider deploying mobile device management (MDM) solutions to enforce browser updates and restrict installation of unapproved applications. 6. Conduct phishing simulation exercises to raise awareness about UI spoofing and social engineering tactics. 7. Review and tighten browser security settings, disabling features that may increase attack surface if feasible. 8. For critical applications, consider alternative browsers or hardened configurations until the vulnerability is patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T22:49:37.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774aad5a09ad00349113

Added to database: 8/12/2025, 5:18:02 PM

Last enriched: 11/14/2025, 6:27:29 AM

Last updated: 12/2/2025, 12:09:59 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats