Multiple vulnerabilities in F-Secure SAFE Browser



Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2021-33595
CVE-2021-33594
CVE-2021-33596
CWE-ID CWE-451
CWE-1021
Exploitation vector Network
Public exploit N/A
Vulnerable software
F-Secure Safe Browser
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor F-Secure

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Spoofing attack

EUVDB-ID: #VU55849

Risk: Medium

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-33595

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can trick a victim to click on a specially crafted URL and spoof page content.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

F-Secure Safe Browser: 18.3.0

CPE2.3 External links

https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame
https://www.f-secure.com/en/business/support-and-downloads/security-advisories
https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33595


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Spoofing attack

EUVDB-ID: #VU55850

Risk: Medium

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-33594

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can trick a victim to click on a specially crafted URL and spoof page content. and performa a dneialof service conriion on the targe system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

F-Secure Safe Browser: 18.3.0

CPE2.3 External links

https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame
https://www.f-secure.com/en/business/support-and-downloads/security-advisories
https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33594


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper Restriction of Rendered UI Layers or Frames

EUVDB-ID: #VU55851

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-33596

CWE-ID: CWE-1021 - Improper Restriction of Rendered UI Layers or Frames

Exploit availability: No

Description

The vulnerability allows a remot attacker to compromise the target system.

The vulnerability exists due to showing the legitimate URL in the address bar while loading the content from other domain. A remote authenticated attacker can trick a victim to click on a specially crafted URL and make the user believe that the content is served by a legit domain .

Mitigation

Install updates from vendor's website.

Vulnerable software versions

F-Secure Safe Browser: 18.3.0

CPE2.3 External links

https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame
https://www.f-secure.com/en/business/support-and-downloads/security-advisories
https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33596


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###