Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65046: Spoofing in Microsoft Microsoft Edge for Android

0
Low
VulnerabilityCVE-2025-65046cvecve-2025-65046
Published: Thu Dec 18 2025 (12/18/2025, 22:01:43 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge for Android

Description

Microsoft Edge (Chromium-based) Spoofing Vulnerability

AI-Powered Analysis

AILast updated: 01/08/2026, 01:02:53 UTC

Technical Analysis

CVE-2025-65046 is a spoofing vulnerability identified in Microsoft Edge for Android, specifically affecting version 1.0.0 of the Chromium-based browser. The vulnerability is categorized under CWE-290, which relates to improper authentication or validation issues that can lead to spoofing attacks. In this context, the flaw allows an attacker to manipulate the browser's UI or content presentation to deceive users, potentially causing them to trust malicious content or links. The CVSS v3.1 base score is 3.1, indicating low severity, with the vector string AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C. This means the attack can be launched remotely over the network without requiring privileges but needs user interaction and has high attack complexity, reducing the likelihood of successful exploitation. The impact is limited to integrity, with no direct confidentiality or availability consequences. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability's presence in the Android version of Microsoft Edge is significant because mobile devices are widely used for browsing, and spoofing attacks can facilitate phishing or social engineering campaigns. The lack of patches means users and organizations must rely on interim mitigations until Microsoft issues an update. The vulnerability's classification as spoofing suggests attackers could craft deceptive URLs or UI elements to trick users into revealing sensitive information or performing unintended actions.

Potential Impact

For European organizations, the primary impact of CVE-2025-65046 lies in the potential for phishing and social engineering attacks leveraging spoofed content within Microsoft Edge on Android devices. This could lead to compromised user trust, credential theft, or unauthorized actions if users are deceived by falsified UI elements. While the vulnerability does not directly compromise confidentiality or availability, the integrity impact can indirectly lead to data breaches or fraud. Organizations with mobile-first workforces or those relying heavily on Android devices for web access are at greater risk. The low severity and high attack complexity reduce the likelihood of widespread exploitation, but targeted attacks against high-value individuals or sectors such as finance, government, or critical infrastructure could still pose a threat. The absence of known exploits in the wild currently limits immediate risk, but the situation could evolve once exploit code becomes available or if attackers develop sophisticated social engineering campaigns.

Mitigation Recommendations

1. Monitor official Microsoft communications and security advisories for patches addressing CVE-2025-65046 and apply updates promptly once available. 2. Educate users about the risks of spoofing attacks, emphasizing caution when interacting with unexpected or suspicious links and UI elements, especially on mobile browsers. 3. Implement mobile device management (MDM) solutions to enforce security policies, restrict installation of untrusted applications, and control browser configurations. 4. Use advanced threat protection tools that can detect and block phishing attempts and malicious URLs in real-time on mobile devices. 5. Encourage the use of multi-factor authentication (MFA) to reduce the impact of credential compromise resulting from spoofing attacks. 6. Conduct regular security awareness training focused on mobile security and social engineering tactics. 7. Consider deploying network-level protections such as DNS filtering and secure web gateways to reduce exposure to malicious sites. 8. For critical users, consider restricting the use of vulnerable browser versions or providing alternative secure browsing options until patches are available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-13T16:18:07.468Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69447c134eb3efac36aec219

Added to database: 12/18/2025, 10:11:31 PM

Last enriched: 1/8/2026, 1:02:53 AM

Last updated: 2/5/2026, 2:52:45 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats