The Indian government, through the Indian Computer Emergency Response Team (CERT-In), has issued a high-risk warning to users of Microsoft Edge, advising them to update their browsers immediately due to critical security vulnerabilities. These vulnerabilities, if exploited, could allow attackers to bypass security restrictions and execute arbitrary code on targeted systems.
The warning specifically targets Microsoft Edge (Chromium-based) versions prior to 129.0.2792.79. CERT-In has identified several flaws related to insufficient data validation in Mojo, inappropriate implementation in V8 (the JavaScript engine), and integer overflow in the Layout component. These flaws could be exploited by remote attackers sending specially crafted requests to a user's system, potentially leading to data theft, system disruption, or even ransomware attacks.
Successful exploitation of these vulnerabilities could grant attackers elevated privileges, bypass security restrictions, obtain sensitive information, conduct remote code execution attacks, or cause denial-of-service (DoS) conditions. In severe cases, attackers could gain unauthorized access to a computer, install malware, or control the system without permission.
CERT-In recommends that users update their Microsoft Edge browsers to the latest version to mitigate these risks. Users can check for updates by opening Microsoft Edge, clicking the three-dot menu in the top right corner, navigating to "Help and Feedback," and then selecting "About Microsoft Edge". The browser will automatically check for and install any available updates.
This isn't the first time CERT-In has issued warnings regarding Microsoft products. In the past, the agency has also alerted users to vulnerabilities in Microsoft Windows, Microsoft Office, Microsoft Azure, Developer Tools, and Microsoft SQL Server. These vulnerabilities could allow attackers to gain elevated privileges, bypass security restrictions, obtain sensitive information or cause denial of service.
The broader context of these warnings highlights the increasing sophistication of cyberattacks and the importance of proactive security measures. Cyber security firm Proofpoint has reported a marked increase in Microsoft 365 account takeovers through the abuse of Microsoft's OAuth device code authorisation flow. Attackers are exploiting a legitimate Microsoft login process to convince users to enter a one-time device code on Microsoft's genuine login portal. Once the code is entered and validated, threat actors gain access tokens that allow full access to the victim's Microsoft 365 account.
To stay safe online, users should keep their software updated, practice good online safety habits, and exercise caution when downloading files or following instructions from unfamiliar sources. It is also important to be aware of social engineering tactics, such as phishing, which can trick individuals into performing actions that compromise their security. By staying informed and taking proactive steps, users can significantly reduce their risk of falling victim to cyberattacks.
