CVE-2021-42308
vulnerability analysis and mitigation

Overview

Microsoft Edge (Chromium-based) was affected by a spoofing vulnerability identified as CVE-2021-42308. The vulnerability was discovered and reported to Microsoft, with the initial record creation date of October 12, 2021, and was publicly disclosed on November 23, 2021. This security flaw affects Microsoft Edge (Chromium-based) versions up to (excluding) 96.0.1054.29 (NVD, CVE).

Technical details

The vulnerability has received varying severity assessments from different sources. The National Vulnerability Database (NVD) assigned it a CVSS v3.1 Base Score of 7.5 (HIGH) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, while Microsoft Corporation rated it lower at 3.1 (LOW) with a vector string of CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) (NVD).

Impact

The vulnerability could potentially allow an attacker to perform spoofing attacks, primarily affecting the integrity of the system without compromising confidentiality or availability. Based on the CVSS scores, the impact ranges from low to high depending on the assessment source (NVD).

Mitigation and workarounds

Microsoft has released a security update to address this vulnerability. Users are advised to upgrade to Microsoft Edge version 96.0.1054.29 or later to mitigate the risk (Rapid7).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management