[CIVN-2026-0092] Remote Code Execution Vulnerability in Microsoft Edge (Chromium-based)

By Published On: February 17, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Remote Code Execution Vulnerability in Microsoft Edge (Chromium-based)


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Microsoft Edge versions prior to 144.0.3719.115

Overview


A vulnerability has been reported in Microsoft Edge, which could allow an attacker to execute arbitrary code on the targeted system.


Target Audience:

All end user organizations and individuals using Microsoft Edge.


Risk Assessment:

High risk of unauthorized access, system compromise, and data exposure.


Impact Assessment:

Potential for remote code execution, sensitive data exposure.


Description


Microsoft Edge is a web browser developed by Microsoft using the chromium engine, offering fast performance, enhanced Security and compatibility with modern web standards while integrating with Microsoft services.


Remote Code Execution Vulnerability exists in Microsoft Edge due to Heap buffer overflow in libvpx. A remote attacker could exploit this vulnerability by persuading a victim to visit a specially crafted web page.


Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the targeted system.


Solution


Apply appropriate fix/patches as mentioned:

https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#february-5-2026



Vendor Information


Microsoft

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1861


References


Microsoft

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1861


CVE Name

CVE-2026-1861




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmUgTcACgkQ3jCgcSdc

ys/OUhAAn5cGdvUOtEv3vr4qdaLNtYTPQ7zpCPWX5rJcM3bl93f5e2x/ikSnPuy9

Q/UfaIQCs5DubdxaC5b8PqZk//2jJ2BNjsgzUUA7hF4sE/8jvJakJn3yo4MY7IGH

Ph2XyEAJzOrdVXi1kt3fqjhNrAmn18Wa2Si002uVQer3E2qFidD/ijo11edc4mNY

uw3Wo58lkOsDoS0kKEvEF467EXo2+uDHNZfMLXBFvtJnH8DWYRyJEW9Fmdh9YFsP

NDxmhUUiNZ4f5mht4xQSbwfvz0gmkBz1HmALcv7z7ooceHeUkLVkS5fPTlbmcfGp

Jhjo1ojUbhc60uzeK6ZsLLJU+fQ+bfgh26f03VaEXX99qH41GliKPK/dT81MzjcM

pKCgKjlLqYmHZGmRUMroR474BZD91ewM4eFrCikf/eNAKkCyppx/QJ39xxE+N5Kr

zScovzFeIf0SJpXua2mT1fZnt6yNbcJ1Z0OSVJk6FonOishHgmxRh67+b0S38wa9

bZU+JRHnOpi74CtlDn/wiKtQ2Uu+ROtLL8MVH6ok0m4R4o4mqXOOgIEPWNBG9iqA

YD/0HxdVU1/v1Bc5Qqabhh9SbYQAtDiAXdIz2aB6d7+LGj6vNOoFNZrXK815nUwk

xNSMcWvQmKrM3m0sGAPttl/5eta8nzL6aMpbU5VRI6TJsbBTXbg=

=1jJv

—–END PGP SIGNATURE—–

Share this article