Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0391: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)

0
Medium
VulnerabilityCVE-2026-0391cvecve-2026-0391cwe-451
Published: Thu Feb 05 2026 (02/05/2026, 22:13:26 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge (Chromium-based)

Description

User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 02/05/2026, 22:45:15 UTC

Technical Analysis

CVE-2026-0391 is a vulnerability classified under CWE-451, indicating a user interface misrepresentation issue in Microsoft Edge (Chromium-based) for Android. This flaw allows an unauthorized attacker to conduct spoofing attacks by misrepresenting critical UI information to the user. The vulnerability arises from the browser's failure to accurately display or distinguish legitimate content from maliciously crafted content, potentially leading users to trust deceptive pages or prompts. The attack vector is network-based, requiring the attacker to be able to intercept or manipulate network traffic, but no user interaction or privileges are necessary to exploit it. The CVSS v3.1 score is 6.5 (medium), reflecting high confidentiality impact due to potential exposure of sensitive information, low integrity impact, and no availability impact. The attack complexity is high, meaning exploitation requires specific conditions or skills, and no known exploits have been reported in the wild. The vulnerability affects version 1.0.0.0 of Microsoft Edge for Android, with no patches currently available. This UI misrepresentation can facilitate phishing or social engineering attacks by deceiving users into revealing confidential information or performing unintended actions.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data confidentiality, especially in sectors where sensitive information is accessed via mobile browsers, such as finance, healthcare, and government. Attackers exploiting this flaw could trick users into divulging credentials, personal data, or other confidential information by presenting spoofed UI elements that appear legitimate. Although the integrity and availability of systems are less affected, the breach of confidentiality could lead to identity theft, financial fraud, or unauthorized access to corporate resources. The network-based nature of the attack means that organizations with employees using public or unsecured Wi-Fi networks are particularly vulnerable. The absence of required user interaction lowers the barrier for exploitation, increasing the risk in environments where users may not be vigilant. This vulnerability could also undermine trust in mobile browsing security, impacting organizational productivity and compliance with data protection regulations such as GDPR.

Mitigation Recommendations

Organizations should prioritize the following mitigations: 1) Monitor for and promptly apply any security updates or patches released by Microsoft for Edge on Android. 2) Implement network security controls such as VPNs and encrypted Wi-Fi to reduce the risk of network-based attacks. 3) Educate users about the risks of spoofed interfaces and encourage vigilance when interacting with links or requests for sensitive information, especially on mobile devices. 4) Employ mobile device management (MDM) solutions to enforce browser usage policies and restrict installation of untrusted applications. 5) Use endpoint detection and response (EDR) tools to monitor for suspicious network activity indicative of man-in-the-middle or spoofing attempts. 6) Encourage the use of multi-factor authentication (MFA) to mitigate the impact of credential compromise. 7) Conduct regular phishing simulation exercises to improve user awareness of UI spoofing tactics. These steps go beyond generic advice by focusing on network security, user behavior, and device management tailored to the Android mobile environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-19T12:01:28.640Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698519f1f9fa50a62f46352c

Added to database: 2/5/2026, 10:30:09 PM

Last enriched: 2/5/2026, 10:45:15 PM

Last updated: 2/5/2026, 11:33:54 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats