CVE-2023-36562

7.1 HIGH

📋 TL;DR

This vulnerability in Microsoft Edge allows attackers to gain elevated privileges on affected systems by exploiting a use-after-free memory corruption issue. It affects users running vulnerable versions of Microsoft Edge on Windows systems. Successful exploitation could allow attackers to execute arbitrary code with higher privileges than intended.

💻 Affected Systems

Products:
  • Microsoft Edge (Chromium-based)
Versions: Versions prior to 118.0.2088.46
Operating Systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Edge versions are vulnerable. The vulnerability is in the browser's memory management component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM-level privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install unwanted software, or access restricted system resources.

🟢

If Mitigated

Limited impact with proper patch management and application sandboxing in place, though some risk remains from sophisticated attacks.

🌐 Internet-Facing: MEDIUM - Requires user interaction (visiting malicious site) but can be combined with other exploits for remote code execution.
🏢 Internal Only: HIGH - Local attackers or malware with initial foothold can escalate privileges to compromise the entire system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (visiting malicious website) and knowledge of memory corruption techniques. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Microsoft Edge version 118.0.2088.46 and later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36562

Restart Required: Yes

Instructions:

1. Open Microsoft Edge. 2. Click Settings (three dots) → Help and feedback → About Microsoft Edge. 3. Browser will automatically check for updates and install if available. 4. Restart Edge when prompted. For enterprise deployments, use Microsoft Edge update policies or Microsoft Endpoint Manager.

🔧 Temporary Workarounds

Disable Edge via Group Policy

windows

Temporarily disable Microsoft Edge while waiting for patch deployment

gpedit.msc → Computer Configuration → Administrative Templates → Windows Components → Microsoft Edge → Set 'Allow Microsoft Edge to start and load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed' to Disabled

Use Application Control

windows

Restrict execution of Microsoft Edge using Windows Defender Application Control

New-CIPolicy -FilePath EdgeBlock.xml -Level Publisher -UserPEs -Fallback Hash -MultiplePolicyFormat
ConvertFrom-CIPolicy -XmlFilePath EdgeBlock.xml -BinaryFilePath EdgeBlock.bin
Deploy via Group Policy: Computer Configuration → Administrative Templates → System → Device Guard → Deploy Code Integrity Policy

🧯 If You Can't Patch

  • Implement strict application whitelisting to prevent unauthorized Edge execution
  • Deploy enhanced monitoring for privilege escalation attempts and unusual Edge process behavior

🔍 How to Verify

Check if Vulnerable:

Open Edge → Settings → Help and feedback → About Microsoft Edge. Check if version is below 118.0.2088.46.

Check Version:

msedge --version (Windows/Linux) or check edge://settings/help in browser

Verify Fix Applied:

Confirm Edge version is 118.0.2088.46 or higher in About Microsoft Edge page.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Security event 4688 (process creation) showing Edge spawning with unusual parent processes
  • Edge crash reports with memory corruption signatures
  • UAC bypass attempts in Windows Security logs

Network Indicators:

  • Connections to known malicious domains from Edge processes
  • Unusual outbound traffic following Edge execution

SIEM Query:

source="Windows Security" EventID=4688 AND (NewProcessName="*\msedge.exe" OR ParentProcessName="*\msedge.exe") | stats count by ParentProcessName, NewProcessName, CommandLine

🔗 References

📤 Share & Export