CVE-2019-1107

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected systems by exploiting a memory corruption flaw in the Chakra scripting engine in Microsoft Edge. Attackers can compromise user systems by tricking victims into visiting specially crafted malicious websites. This affects users running vulnerable versions of Microsoft Edge on Windows 10.

💻 Affected Systems

Products:
  • Microsoft Edge
Versions: Microsoft Edge (EdgeHTML-based) versions prior to July 2019 updates
Operating Systems: Windows 10
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the legacy EdgeHTML-based Microsoft Edge browser, not the newer Chromium-based Edge. Windows 7/8.1 are not affected as they don't include EdgeHTML-based Edge.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install programs, view/change/delete data, or create new accounts with full user rights.

🟠

Likely Case

Browser compromise leading to data theft, credential harvesting, or installation of malware on the victim's system.

🟢

If Mitigated

Limited impact with proper browser sandboxing and security controls, potentially containing the exploit to the browser process.

🌐 Internet-Facing: HIGH - Exploitable through malicious websites, making any internet-connected Edge browser vulnerable.
🏢 Internal Only: MEDIUM - Requires user interaction (visiting malicious site) but could be exploited through internal phishing campaigns.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious website) but no authentication. Memory corruption vulnerabilities in JavaScript engines are frequently exploited in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Microsoft Edge version with July 2019 security updates (KB4507453 for Windows 10 1903, KB4507469 for 1809, etc.)

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Click 'Check for updates'. 3. Install all available updates. 4. Restart computer when prompted. 5. Verify Edge is updated to July 2019 or later version.

🔧 Temporary Workarounds

Disable JavaScript

windows

Prevents exploitation by disabling JavaScript execution in Edge

edge://settings/content/javascript (toggle to 'Blocked')

Use Enhanced Security Configuration

windows

Enables additional security restrictions in Internet Explorer mode

Control Panel > Internet Options > Security tab > Enable Enhanced Protected Mode

🧯 If You Can't Patch

  • Migrate to Chromium-based Microsoft Edge which is not affected by this vulnerability
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Edge version: Open Edge > Settings > About Microsoft Edge. If version is from before July 2019, system is vulnerable.

Check Version:

msedge --version (in command prompt) or check edge://settings/help

Verify Fix Applied:

Verify Windows Update history contains July 2019 security updates and Edge version shows July 2019 or later build.

📡 Detection & Monitoring

Log Indicators:

  • Edge crash reports with chakra.dll in stack trace
  • Unexpected Edge process termination events
  • Security event logs showing suspicious script execution

Network Indicators:

  • Unusual outbound connections from Edge process
  • Traffic to known malicious domains hosting exploit code

SIEM Query:

source="windows" AND (process_name="msedge.exe" AND event_id="1000" AND module_name="chakra.dll") OR (process_name="msedge.exe" AND parent_process NOT IN ("explorer.exe", "userinit.exe"))

🔗 References

📤 Share & Export