Alert GCSA-26025 - Vulnerabilita' in Microsoft Edge
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
******************************************************************
Alert ID: GCSA-26025
Data: 20 Febbraio 2026
Titolo: Vulnerabilita' in Microsoft Edge
******************************************************************
:: Descrizione del problema
Sono state identificate vulnerabilita' multiple in Microsoft Edge
che potrebbero essere sfruttate da un attaccante remoto per
eludere restrizioni di sicurezza, rivelare informazioni sensibili,
eseguire codice arbitrario ed innescare condizioni di Denial of Service
su un sistema che sia affetto.
La vulnerabilità CVE-2026-2441 e' attualmente in fase di sfruttamento,
il livello di rischio e' classificato come estremamente elevato.
Maggiori informazioni sono disponibili alla sezione "Riferimenti".
:: Software interessato
Microsoft Edge versioni precedenti alla 145.0.3800.58
:: Impatto
Denial of Service
Remote Code Execution
Information Disclosure
Security Restriction Bypass
:: Soluzioni
Aggiornare il software all'ultima versione disponibile
L'aggiornamento avviene in modo automatico.
E' possibile verificare la versione attualmente in uso
scegliendo dal menu "Impostazioni e altro"
(icona 3 punti verticali in alto a dx) la voce
Guida e feedback -> Informazioni su Microsoft Edge
:: Riferimenti
Security Update Guide
https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#february-14-2026
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0102
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2313
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2314
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2316
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2317
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2318
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2319
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2320
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2322
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2323
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2441
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2441
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iGsEAREIACsWIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCaZgbOw0cY2VydEBnYXJy
Lml0AAoJEMGcTJNlEmBCsNAAoMxHArlrr8lGH/wAbFqXeMA/5UNbAJ9b1nsJiH2Z
bC3tAkgGMmYEUBKrLw==
=B46b
-----END PGP SIGNATURE-----
Hash: SHA256
******************************************************************
Alert ID: GCSA-26025
Data: 20 Febbraio 2026
Titolo: Vulnerabilita' in Microsoft Edge
******************************************************************
:: Descrizione del problema
Sono state identificate vulnerabilita' multiple in Microsoft Edge
che potrebbero essere sfruttate da un attaccante remoto per
eludere restrizioni di sicurezza, rivelare informazioni sensibili,
eseguire codice arbitrario ed innescare condizioni di Denial of Service
su un sistema che sia affetto.
La vulnerabilità CVE-2026-2441 e' attualmente in fase di sfruttamento,
il livello di rischio e' classificato come estremamente elevato.
Maggiori informazioni sono disponibili alla sezione "Riferimenti".
:: Software interessato
Microsoft Edge versioni precedenti alla 145.0.3800.58
:: Impatto
Denial of Service
Remote Code Execution
Information Disclosure
Security Restriction Bypass
:: Soluzioni
Aggiornare il software all'ultima versione disponibile
L'aggiornamento avviene in modo automatico.
E' possibile verificare la versione attualmente in uso
scegliendo dal menu "Impostazioni e altro"
(icona 3 punti verticali in alto a dx) la voce
Guida e feedback -> Informazioni su Microsoft Edge
:: Riferimenti
Security Update Guide
https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#february-14-2026
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0102
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2313
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2314
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2316
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2317
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2318
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2319
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2320
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2322
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2323
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2441
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2441
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iGsEAREIACsWIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCaZgbOw0cY2VydEBnYXJy
Lml0AAoJEMGcTJNlEmBCsNAAoMxHArlrr8lGH/wAbFqXeMA/5UNbAJ9b1nsJiH2Z
bC3tAkgGMmYEUBKrLw==
=B46b
-----END PGP SIGNATURE-----