Microsoft closes serious security vulnerability in Edge browsers

A critical vulnerability in Edge browsers allows the remote execution of malicious code. The latest patch fixes the problem.

listen Print view

(Image: Screenshot und Montage: heise online)

1 min. read

Microsoft has closed a critical security vulnerability. This vulnerability, classified as a zero-day vulnerability, made it possible to remotely execute malicious code in the Edge browser via manipulated HTML pages. In the worst-case scenario, this flaw could lead to data theft, malware installation or complete system takeover. "Zero-day" refers to acute vulnerabilities that must be closed immediately with a "zero-day" response time.

To install the update, go to the "Help and feedback" menu item and select "About Microsoft Edge". The update will then be loaded automatically, and the current release number will be displayed. In the mobile network, the option "Download updates via clocked connections" may need to be activated. The release version should then be 128.0.2739.42 or newer, and the message "Microsoft Edge is up-to-date" should appear. On several PCs in the heise online editorial team, the update was not installed by manually calling up Windows Update, only the path via the browser itself was successful.

Videos by heise

Microsoft points out that the vulnerability cataloged as CVE-2024-7971 is being actively exploited and emphasizes the urgency of installing the latest update immediately.

(nie)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.