CVE-2023-24892

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to spoof URLs in Microsoft Edge WebView2, potentially tricking users into visiting malicious sites. It affects applications using WebView2 control on Windows systems. Users could be redirected to phishing sites or malicious content.

💻 Affected Systems

Products:
  • Microsoft Edge WebView2 Runtime
  • Applications using WebView2 control
Versions: Versions prior to 110.0.1587.57
Operating Systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Chromium-based Edge WebView2, not the legacy EdgeHTML version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to sophisticated phishing sites that steal credentials, financial information, or deliver malware, leading to full system compromise.

🟠

Likely Case

Users are tricked into visiting spoofed websites that appear legitimate, potentially leading to credential harvesting or malware installation.

🟢

If Mitigated

With proper URL validation and user education, impact is limited to failed phishing attempts with minimal damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a link) but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 110.0.1587.57 or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24892

Restart Required: Yes

Instructions:

1. Open Microsoft Edge. 2. Click Settings > About Microsoft Edge. 3. Allow automatic update or manually update. 4. Restart Edge and affected applications.

🔧 Temporary Workarounds

Disable WebView2 in applications

windows

Temporarily disable WebView2 components in applications until patched.

🧯 If You Can't Patch

  • Implement application allowlisting to restrict untrusted WebView2 usage
  • Deploy network filtering to block known malicious domains and suspicious redirects

🔍 How to Verify

Check if Vulnerable:

Check WebView2 version in Edge settings or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}

Check Version:

reg query "HKLM\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}" /v pv

Verify Fix Applied:

Verify WebView2 version is 110.0.1587.57 or higher in Edge settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL redirect patterns in application logs
  • Multiple failed authentication attempts following WebView2 usage

Network Indicators:

  • Unexpected outbound connections to suspicious domains after WebView2 interaction
  • HTTP redirect chains ending in known malicious sites

SIEM Query:

source="*edge*" OR source="*webview*" AND (url="*redirect*" OR url="*phish*" OR url="*malicious*")

🔗 References

📤 Share & Export