
[CIVN-2025-0289] Multiple Vulnerabilities in Microsoft Edge Stable (Chromium-based)
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Microsoft Edge Stable (Chromium-based)
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Microsoft Edge Stable Channel (Chromium-based) versions prior to 141.0.3537.71
Overview
Multiple vulnerabilities have been reported in Microsoft Edge Stable (Chromium-based) which could allow a remote attacker to execute arbitrary code, bypass security, perform spoofing attack or disclose sensitive information on the targeted system.
Target Audience:
All end-user organizations and individuals using Microsoft Edge Stable (Chromium-based).
Risk Assessment:
High risk of remote code execution.
Impact Assessment:
Potential for unauthorized data access or service disruption.
Description
Microsoft Edge Stable (Chromium-based) is a web browser developed by Microsoft using the Chromium engine, offering fast performance, enhanced security, and compatibility with modern web standards while integrating with Microsoft services.
Multiple vulnerabilities exist in Microsoft Edge Stable (Chromium-based) due to Heap Incorrect security UI in Omnibox, SplitView, Fullscreen UI; Policy bypass in Extensions; Inappropriate implementation in V8, Autofill, App-Bound Encryption, Extensions; Out of bounds read in V8; Use after free in Ozone, PageInfo; Race in Storage, V8; Object lifecycle issue in Media and Type Confusion in V8. A remote attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted web page.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security, perform spoofing attack or disclose sensitive information on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor.
https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#october-31-2025
https://msrc.microsoft.com/update-guide/vulnerability
Vendor Information
Microsoft
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12036
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12428
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12429
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12430
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12431
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12432
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12433
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12434
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12435
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12436
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12437
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12438
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12439
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12440
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12441
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12443
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12444
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12445
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12446
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12447
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60711
References
Microsoft
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12036
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12428
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12429
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12430
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12431
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12432
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12433
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12434
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12435
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12436
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12437
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12438
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12439
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12440
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12441
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12443
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12444
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12445
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12446
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12447
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60711
CVE Name
CVE-2025-12036
CVE-2025-12428
CVE-2025-12429
CVE-2025-12430
CVE-2025-12431
CVE-2025-12432
CVE-2025-12433
CVE-2025-12434
CVE-2025-12435
CVE-2025-12436
CVE-2025-12437
CVE-2025-12438
CVE-2025-12439
CVE-2025-12440
CVE-2025-12441
CVE-2025-12443
CVE-2025-12444
CVE-2025-12445
CVE-2025-12446
CVE-2025-12447
CVE-2025-60711
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=uJ+h
—–END PGP SIGNATURE—–


