[CIVN-2025-0376] Remote Code Execution Vulnerabilities in Microsoft Edge

By Published On: December 19, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerabilities in Microsoft Edge
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Microsoft Edge version prior to 143.0.3650.96
Overview
Multiple vulnerabilities have been reported in Microsoft Edge which could allow a remote attacker to execute arbitrary code on the targeted system.
Target Audience:
All end-user organizations and individuals using Microsoft Edge.
Risk Assessment:
High risk of full system compromise or data theft.
Impact Assessment:
Potential for arbitrary code execution or sensitive data disclosure.
Description
Microsoft Edge is a web browser developed by Microsoft using the Chromium engine, offering fast performance, enhanced security, and compatibility with modern web standards while integrating with Microsoft services.
These vulnerabilities exists in Microsoft Edge due to an out-of-bounds read and write in V8 or use-after-free in WebGPU. A remote attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted webpage.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned in:
https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#december-18-2025
Vendor Information
Microsoft
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-14765
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-14766
References
Microsoft
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-14765
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-14766
CVE Name
CVE-2025-14765
CVE-2025-14766
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=4kb6
—–END PGP SIGNATURE—–

Share this article