Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2378: CWE-1021 Improper restriction of rendered UI layers or frames in The BrowserCompany of New York ArcSearch

0
High
VulnerabilityCVE-2026-2378cvecve-2026-2378cwe-1021
Published: Fri Mar 20 2026 (03/20/2026, 21:16:51 UTC)
Source: CVE Database V5
Vendor/Project: The BrowserCompany of New York
Product: ArcSearch

Description

ArcSearch for Android versions prior to 1.12.7 could display a different domain in the address bar than the content being shown, enabling address bar spoofing after user interaction via crafted web content.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 23:02:27 UTC

Technical Analysis

CVE-2026-2378 is a vulnerability identified in The BrowserCompany of New York's ArcSearch browser for Android, specifically affecting versions prior to 1.12.7. The root cause is an improper restriction of rendered UI layers or frames (CWE-1021), which allows the browser's address bar to display a domain name that does not match the actual content being rendered. This discrepancy can be exploited by attackers who craft malicious web content that, after user interaction, causes the browser to show a spoofed domain in the address bar. This form of address bar spoofing undermines the browser's integrity by misleading users about the true origin of the content they are viewing, potentially facilitating phishing attacks or other social engineering exploits. The vulnerability does not directly compromise confidentiality or availability but poses a significant risk to user trust and security. The CVSS 3.1 base score of 7.4 reflects a high severity, with attack vector being network-based, no privileges required, low attack complexity, user interaction required, and scope changed due to the integrity impact. No patches or exploits in the wild have been reported at the time of publication, but the vendor has released version 1.12.7 to address this issue. The vulnerability highlights the importance of strict UI layer management in browsers to prevent spoofing attacks that can deceive users.

Potential Impact

The primary impact of CVE-2026-2378 is the compromise of browser UI integrity, enabling attackers to spoof the address bar domain. This can lead to successful phishing attacks where users are tricked into believing they are on a legitimate website, potentially resulting in credential theft, financial fraud, or malware installation. Since the vulnerability requires user interaction, social engineering techniques are likely to be employed by attackers. Although confidentiality and availability are not directly affected, the integrity breach undermines user trust and can have cascading effects on organizational security. Enterprises relying on ArcSearch for Android could face increased risk of targeted phishing campaigns, especially in sectors where secure browsing is critical, such as finance, healthcare, and government. The lack of known exploits in the wild suggests the vulnerability is not yet widely exploited, but the ease of exploitation and high severity score indicate a significant potential threat if weaponized.

Mitigation Recommendations

To mitigate CVE-2026-2378, organizations and users should immediately update ArcSearch on Android devices to version 1.12.7 or later, where the vulnerability has been addressed. Until updates are applied, users should be educated about the risk of address bar spoofing and advised to verify website authenticity through additional means, such as checking SSL certificates or using trusted bookmarks. Security teams should monitor for phishing campaigns targeting ArcSearch users and deploy endpoint protection solutions capable of detecting suspicious web content or behavior. Implementing browser security policies that restrict the use of untrusted web content and enabling multi-factor authentication can reduce the impact of potential credential theft resulting from spoofing attacks. Additionally, organizations should consider network-level protections such as DNS filtering and web proxies to block access to known malicious domains. Regular security assessments and user awareness training focused on UI spoofing and phishing threats will further strengthen defenses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
BCNY
Date Reserved
2026-02-11T21:24:56.878Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdbd91e2bf98efc48d0974

Added to database: 3/20/2026, 9:35:13 PM

Last enriched: 3/27/2026, 11:02:27 PM

Last updated: 5/3/2026, 6:12:44 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses