Impact
The vulnerability allows an attacker to deceive users by presenting counterfeit content or identities within Microsoft Edge (Chromium-based) on Android devices. This can lead to users believing they are interacting with a legitimate site or source when they are not, potentially facilitating phishing or social engineering attacks. The weakness is classified under CWE-290 (Authentication Spoofing) and CWE-451 (Code Review Does Not Verify Critical Function). The design of the browser means that the spoofed content could appear seamless to the user, undermining trust and increasing the risk of credential disclosure if the user proceeds to enter personal information.
Affected Systems
Affected systems are Microsoft Edge for Android, a Chromium‑based browser distributed by Microsoft. No specific version range is listed in the CNA data, so all releases of the Android Edge browser at the time of disclosure are potentially impacted.
Risk and Exploitability
The CVSS base score of 3.1 indicates a low overall impact. The EPSS score of less than 1% suggests a very low probability that this weakness is being actively exploited in the wild, and it is not currently listed in the CISA KEV catalog. The likely attack vector is inferred to be through malicious or compromised web content rendered in the Edge Android browser, where the spoofed assets would be viewed by unsuspecting users. Because the flaw does not grant code execution or privilege escalation, the threat is confined to the user's trust and visibility within the web page rendered by the browser.
OpenCVE Enrichment