CVE-2022-24475

8.3 HIGH

📋 TL;DR

This vulnerability in Microsoft Edge (Chromium-based) allows attackers to gain elevated privileges on affected systems. It affects users running vulnerable versions of Microsoft Edge on Windows systems. Successful exploitation could allow an attacker to execute code with higher privileges than intended.

💻 Affected Systems

Products:
  • Microsoft Edge (Chromium-based)
Versions: Versions prior to 99.0.1150.30
Operating Systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Microsoft Edge based on Chromium, not legacy EdgeHTML-based versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain SYSTEM-level privileges, install malware, steal sensitive data, or completely compromise the affected system.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install persistent backdoors, or access restricted resources.

🟢

If Mitigated

Limited impact with proper patch management and security controls; attacker would need initial access to exploit.

🌐 Internet-Facing: LOW - This is primarily a local privilege escalation vulnerability requiring initial access to the system.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or attackers who have gained initial foothold through other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to the system; no known public exploits as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Microsoft Edge version 99.0.1150.30 or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24475

Restart Required: Yes

Instructions:

1. Open Microsoft Edge. 2. Click Settings (three dots) → Help and feedback → About Microsoft Edge. 3. Browser will automatically check for and install updates. 4. Restart Edge when prompted. For enterprise deployments, use Microsoft Edge update channels or Microsoft Endpoint Manager.

🔧 Temporary Workarounds

Disable Microsoft Edge

windows

Temporarily disable Microsoft Edge browser usage while awaiting patch deployment

Use alternative browser

all

Switch to alternative browsers like Chrome or Firefox until Edge is patched

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Edge execution
  • Restrict user privileges to minimize impact of potential privilege escalation

🔍 How to Verify

Check if Vulnerable:

Check Microsoft Edge version: Open Edge → Settings → About Microsoft Edge. If version is below 99.0.1150.30, system is vulnerable.

Check Version:

msedge --version

Verify Fix Applied:

Verify Edge version is 99.0.1150.30 or higher after update and restart.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Edge process spawning with elevated privileges
  • Edge crash reports with privilege escalation patterns

Network Indicators:

  • Unusual outbound connections from Edge processes with elevated privileges

SIEM Query:

Process Creation where (Image contains 'msedge.exe' and IntegrityLevel changes from Medium to High or System)

🔗 References

📤 Share & Export