Edge Vulnerability Allows File Manipulation, Information Disclosure
Summary
CERT-Bund issued a security advisory about a vulnerability in Microsoft Edge (versions prior to 146.0.3856.84) with a CVSS Base Score of 4.2 (medium). The vulnerability allows remote anonymous attackers to manipulate files and disclose confidential information. Users are advised to update to the patched version.
What changed
CERT-Bund published advisory WID-SEC-2026-0905 disclosing a vulnerability in Microsoft Edge affecting versions before 146.0.3856.84. The vulnerability enables remote, anonymous attackers to exploit the browser to manipulate files and disclose confidential information. This is classified as a medium-severity issue with CVSS Base Score 4.2 and temporal score 3.7.
Organizations and individual users running affected Microsoft Edge versions should update to version 146.0.3856.84 or later immediately. Security teams should review patch management procedures and prioritize applying this update according to organizational vulnerability management policies.
What to do next
- Update Microsoft Edge to version 146.0.3856.84 or later
- Review and apply updates through organizational patch management procedures
- Assess exposure of sensitive files to potential exploitation
Archived snapshot
Mar 30, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-0905] Microsoft Edge: Schwachstelle ermöglicht Manipulation von Dateien und die Offenlegung von Informationen CVSS Base Score 4.2 (mittel) CVSS Temporal Score 3.7 (niedrig) Remoteangriff ja Datum 29.03.2026 Stand 30.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Windows
Produktbeschreibung
Edge ist ein Web Browser von Microsoft.
Produkte
29.03.2026
- Microsoft Edge <146.0.3856.84
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Microsoft Edge ausnutzen, um Dateien zu manipulieren und vertrauliche Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.