
Cloud Vulnerability DB
A community-led vulnerabilities database
Yandex Browser for Android prior to version 21.3.0 was discovered to contain a vulnerability that allows remote attackers to perform IDN homograph attacks. The vulnerability was identified and reported by security researcher Kirtikumar Anandrao Ramchandani and was assigned the identifier CVE-2021-25262 (Yandex BugBounty, Wiz).
The vulnerability is related to IDN (Internationalized Domain Name) homograph attacks, which involve using visually similar characters from different writing systems to create deceptive domain names. This type of attack can be used to create URLs that appear legitimate but actually lead to malicious websites. The vulnerability has been assigned a CVSS score of 6.9, indicating a medium severity level (Wiz).
The vulnerability allows remote attackers to perform IDN homograph attacks, which could potentially lead to phishing attacks by creating visually deceptive URLs that appear legitimate to users. This could result in users being directed to malicious websites while believing they are visiting legitimate ones (Wiz).
The vulnerability has been fixed in Yandex Browser for Android version 21.3.0. Users are advised to update their browser to this version or later to protect against IDN homograph attacks (Yandex BugBounty).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."