Alert GCSA-26068 - Vulnerabilita' in Microsoft Edge
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
******************************************************************
Alert ID: GCSA-26068
Data: 20 Aprile 2026
Titolo: Vulnerabilita' in Microsoft Edge
******************************************************************
:: Descrizione del problema
Sono state identificate vulnerabilita' multiple in Microsoft Edge
che potrebbero essere sfruttate da un attaccante remoto per
eludere restrizioni di sicurezza, rivelare informazioni sensibili,
eseguire codice arbitrario ed innescare condizioni di Denial of Service
su un sistema che sia affetto.
Maggiori informazioni sono disponibili alla sezione "Riferimenti".
:: Software interessato
Microsoft Edge versioni precedenti alla 147.0.3912.72
:: Impatto
Denial of Service
Remote Code Execution
Information Disclosure
Security Restriction Bypass
:: Soluzioni
Aggiornare il software all'ultima versione disponibile
L'aggiornamento avviene in modo automatico.
E' possibile verificare la versione attualmente in uso
scegliendo dal menu "Impostazioni e altro"
(icona 3 punti verticali in alto a dx) la voce
Guida e feedback -> Informazioni su Microsoft Edge
:: Riferimenti
Security Update Guide
https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#april-16-2026
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6296
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6297
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6298
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6299
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6300
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6301
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6302
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6303
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6304
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6305
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6306
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6307
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6308
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6309
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6310
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6311
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6312
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6313
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6314
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6316
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6317
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6318
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6359
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6360
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6361
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6362
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6363
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6364
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6306
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6364
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EAREIAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCaeXRowAKCRDBnEyTZRJg
QqNcAKDBJ/kWmE5cS8VUIcMXac2XmQskoQCfWALbu7i5TzB3D2U20efGXxGINe0=
=8j20
-----END PGP SIGNATURE-----
Hash: SHA256
******************************************************************
Alert ID: GCSA-26068
Data: 20 Aprile 2026
Titolo: Vulnerabilita' in Microsoft Edge
******************************************************************
:: Descrizione del problema
Sono state identificate vulnerabilita' multiple in Microsoft Edge
che potrebbero essere sfruttate da un attaccante remoto per
eludere restrizioni di sicurezza, rivelare informazioni sensibili,
eseguire codice arbitrario ed innescare condizioni di Denial of Service
su un sistema che sia affetto.
Maggiori informazioni sono disponibili alla sezione "Riferimenti".
:: Software interessato
Microsoft Edge versioni precedenti alla 147.0.3912.72
:: Impatto
Denial of Service
Remote Code Execution
Information Disclosure
Security Restriction Bypass
:: Soluzioni
Aggiornare il software all'ultima versione disponibile
L'aggiornamento avviene in modo automatico.
E' possibile verificare la versione attualmente in uso
scegliendo dal menu "Impostazioni e altro"
(icona 3 punti verticali in alto a dx) la voce
Guida e feedback -> Informazioni su Microsoft Edge
:: Riferimenti
Security Update Guide
https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#april-16-2026
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6296
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6297
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6298
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6299
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6300
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6301
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6302
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6303
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6304
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6305
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6306
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6307
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6308
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6309
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6310
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6311
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6312
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6313
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6314
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6316
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6317
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6318
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6359
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6360
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6361
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6362
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6363
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6364
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6306
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6364
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EAREIAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCaeXRowAKCRDBnEyTZRJg
QqNcAKDBJ/kWmE5cS8VUIcMXac2XmQskoQCfWALbu7i5TzB3D2U20efGXxGINe0=
=8j20
-----END PGP SIGNATURE-----
