IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Researchers ‘break’ Edge with zero-day remote code exploit

Proof-of-concept shows researchers opening the Chrome landing page from Edge via Firefox

Hacking on keyboard

Security researchers have teased a zero-day exploit for Microsoft's Edge browser that can allow a malicious actor to run commands on a user's machine.

Two vulnerabilities, discovered by exploit developer Yushi Laing with help from Alexander Kochkov, could allow an anonymous user execute code remotely, and potentially seize control of a user's device.

Laing teased the "stable exploit" for the Microsoft-developed web browser last week with an image that appeared to show the Windows Calculator app launched from a web browser, after working on the project for just under a week.

The researcher had initially been looking into three remote code execution bugs for Firefox as part of an 'exploit chain', but struggled to establish code for the third. He then found two similar flaws on Microsoft Edge using the Wadi Fuzzer app developed by SensePost.

Laing told BleepingComputer the pair wanted to develop a stable exploit for Microsoft Edge and escape the sandbox, termed as an exploit that force-crashes and incorrectly reloads an app with manipulated permissions.

This would allow a user to run functions, and access other apps, beyond its normal permissions, as well as access data from other applications. They were also looking for a way to effectively seize control of a machine by escalating execution privileges to 'system'.

They published a proof-of-concept for the Edge exploit in a short clip which shows the team using the browser to open the landing page for Google Chrome via Firefox.

Microsoft previously left a zero-day Edge exploit unpatched for 90 days, which led to Google's Project Zero security team publishing the full details.

The flaw was nowhere near as severe as a remote code execution bug, rather it allowed an attacker who had already seized control of a browser to bypass a second layer of security.

Laing said the pair will not go public with their latest Edge exploit until they finalise their write-up.

"Microsoft has a strong commitment to security and a demonstrated track record of investigating and providing resolution as soon as possible," Microsoft's senior director Jeff Jones told IT Pro.

Featured Resources

The Total Economic Impact™ Of Turbonomic Application Resource Management for IBM Cloud® Paks

Business benefits and cost savings enabled by IBM Turbonomic Application Resource Management

Free Download

The Total Economic Impact™ of IBM Watson Assistant

Cost savings and business benefits enabled by Watson Assistant

Free Download

The field guide to application modernisation

Moving forward with your enterprise application portfolio

Free Download

AI for customer service

Discover the industry-leading AI platform that customers and employees want to use

Free Download

Recommended

Kaspersky exposes MysterySnail zero-day exploit in Windows
zero-day exploit

Kaspersky exposes MysterySnail zero-day exploit in Windows

13 Oct 2021

Most Popular

Apple patches 'superpower' zero-days affecting iPhones, iPads, and Macs
zero-day exploit

Apple patches 'superpower' zero-days affecting iPhones, iPads, and Macs

18 Aug 2022
Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
The benefits of a hardware update for SMBs
Sponsored

The benefits of a hardware update for SMBs

2 Aug 2022