Security Alert

Microsoft Edge Remote Code Execution Vulnerability (CVE-2023-38187)


Joseph Morgan


16 August, 2023


Update Microsoft Edge

A remote code execution vulnerability has been discovered in Microsoft Edge web browser. The affected version of the browser is unknown, and the vulnerability has been classified as problematic. The vulnerability impacts confidentiality, integrity, and availability.

The vulnerability was disclosed on 07/21/2023, and an advisory regarding this issue can be found at Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This vulnerability has been assigned the CVE identifier CVE-2023-38187 since 07/12/2023. Successful exploitation of this vulnerability requires user interaction by the victim. There are no technical details or exploits publicly available at this time. The current price for an exploit might be approximately USD $5k-$25k (estimated as of 07/21/2023).

Users are advised to upgrade their software to eliminate this vulnerability.

  • Product Information:

    • Type: Web Browser
    • Vendor: Microsoft
    • Name: Edge
    • License: Commercial
  • Vulnerability Details:

    • Class: Remote Code Execution
    • CWE: Unknown
    • ATT&CK: Unknown
    • Local: No
    • Remote: Yes
    • Availability: Not Available
    • Status: Not Defined
    • CVSSv3 Base Score: 5.0
  • Timeline:

    • 07/12/2023: CVE reserved
    • 07/21/2023: Advisory disclosed
    • 07/21/2023: VulDB entry created
    • 08/15/2023: VulDB last update
  • Sources:

    • Vendor:
    • Advisory: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
    • Status: Confirmed
    • CVE: CVE-2023-38187

TechTip: Mitigate Security Risks with Regular Software Updates

The recent Microsoft Edge Remote Code Execution Vulnerability (CVE-2023-38187) underscores the importance of regularly updating your software. Outdated software can expose your systems to significant security threats, compromising the confidentiality, integrity, and availability of your data. Here’s how to stay ahead of these risks:

  1. Consistent Software Updates: Regularly check for and install the latest updates for your applications, especially web browsers that connect to the internet. This proactive approach is critical to mitigating security vulnerabilities like CVE-2023-38187.

  2. Official Sources: Always download updates from official and trusted sources, such as Microsoft’s website or in-built update mechanisms. This step ensures the authenticity and integrity of the updates.

Staying updated is vital, but we understand that it can be time-consuming and often overwhelming.

Let Us Handle It for You

NanoTech Security is proud to offer a comprehensive Remote IT Monitoring & Management Service designed to keep your software updated and your systems secure. With our expertise, you can stay ahead of security threats without the hassle of manual updates.

Our dedicated team will remotely monitor your systems, promptly apply necessary updates, and act on your behalf to mitigate any vulnerabilities. With us, you can be confident in your system’s security, allowing you to focus on your business operations.

10-Day FREE Trial

We invite you to try our Remote IT Monitoring & Management Service, completely free for 10 days. Experience the peace of mind that comes from knowing your software is up-to-date and your systems are secure.

Take advantage of this limited-time offer and see how NanoTech Security can provide a tailored solution for your unique needs.

Let's Work Together

Introduce us to your unique challenges, and NanoTech Security will tailor the optimal cybersecurity solution for your organisation’s distinct needs.