Google has gone public with details about a Microsoft Edge vulnerability that attackers could abuse and bypass one of the browser’s security features —Arbitrary Code Guard (ACG).
ACG is a relatively new feature added to Edge’s security model. Microsoft added support for ACG in Edge in April 2017, with the release of the Windows 10 Creators Update.
ACG was the second of two new features that Microsoft said would prevent attackers from using JavaScript to load malicious code into a computer’s memory via Edge. Microsoft described the two new security features in a blog post last year. A summary of ACG and Code Integrity Guard (CIG) is below:
Google engineer finds ACG bypass
Ivan Fratric, a security engineer with Google’s Project Zero team, has discovered a way to bypass ACG and allow an attacker to load unsigned code in memory, allowing attackers a way into Windows boxes via malicious websites loaded via Edge.
Fratric reported the issue to Microsoft last November, in a private bug report, but the deadline for fixing the bug passed.
« The fix is more complex than initially anticipated, and it is very likely that we will not be able to meet the February release deadline due to these memory management issues, » Microsoft told Fratric.
« The [Microsoft Edge] team IS positive that this will be ready to ship on March 13th, » Microsoft added.
Second Edge bug Fratric has discovered
Details about this issue are now public. This is not the first time that Fratric has publicly disclosed a bug in Edge, doing so in February last year.
To read the original article:
https://www.bleepingcomputer.com/news/security/google-discloses-microsoft-edge-security-feature-bypass/