Microsoft has issued a critical security update for its Edge browser, addressing multiple severe vulnerabilities that could jeopardize user systems. Released on August 1, 2024, this update is designed to fix three major issues in Microsoft Edge versions prior to 127.0.2651.86. The most critical of these, CVE-2024-7256, involves a validation flaw in the Dawn graphics component, which could allow attackers to execute arbitrary code on a victim’s system. This vulnerability was reported by the researcher known as “gelatin dessert” on July 23, 2024, and its exploitation could lead to significant security breaches.
In addition to CVE-2024-7256, the update addresses CVE-2024-6990, an uninitialized use vulnerability in the Dawn component. This flaw poses a risk of out-of-bounds memory access, potentially allowing attackers to manipulate memory in ways that could compromise system integrity. The update also resolves CVE-2024-7255, which affects the WebTransport feature and could enable attackers to perform out-of-bounds memory read operations. These vulnerabilities impact Edge across various operating systems, including Windows, macOS, and Linux, making it crucial for users on all platforms to apply the update.
Microsoft has rated these vulnerabilities with high and critical severity levels, highlighting the urgency of applying the update. Users are strongly advised to upgrade their browsers to version 127.0.2651.86 or later to mitigate these security risks. While Edge’s automatic update feature generally manages this process, users can also manually check for updates through the browser’s settings to ensure they are protected against these newly discovered threats.
For additional security, users should enable Edge’s enhanced security mode, which may offer extra protection against these and other potential vulnerabilities. Keeping software up-to-date, practicing safe browsing habits, and remaining vigilant against phishing and other cyber threats are essential practices for maintaining robust cybersecurity. By staying informed and proactive, users can better protect themselves against emerging and evolving cyber risks.
Reference: