Alert GCSA-26068 - Vulnerabilita' in Microsoft Edge

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ****************************************************************** Alert ID: GCSA-26068 Data: 20 Aprile 2026 Titolo: Vulnerabilita' in Microsoft Edge ****************************************************************** :: Descrizione del problema Sono state identificate vulnerabilita' multiple in Microsoft Edge che potrebbero essere sfruttate da un attaccante remoto per eludere restrizioni di sicurezza, rivelare informazioni sensibili, eseguire codice arbitrario ed innescare condizioni di Denial of Service su un sistema che sia affetto. Maggiori informazioni sono disponibili alla sezione "Riferimenti". :: Software interessato Microsoft Edge versioni precedenti alla 147.0.3912.72 :: Impatto Denial of Service Remote Code Execution Information Disclosure Security Restriction Bypass :: Soluzioni Aggiornare il software all'ultima versione disponibile L'aggiornamento avviene in modo automatico. E' possibile verificare la versione attualmente in uso scegliendo dal menu "Impostazioni e altro" (icona 3 punti verticali in alto a dx) la voce Guida e feedback -> Informazioni su Microsoft Edge :: Riferimenti Security Update Guide https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#april-16-2026 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6296 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6297 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6298 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6299 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6300 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6301 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6302 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6303 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6304 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6305 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6306 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6307 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6308 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6309 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6310 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6311 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6312 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6313 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6314 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6316 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6317 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6318 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6359 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6360 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6361 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6362 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6363 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6364 Mitre CVE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6296 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6297 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6298 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6299 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6301 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6303 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6306 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6307 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6309 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6310 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6311 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6312 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6313 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6314 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6316 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6317 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6359 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6360 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6361 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6363 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6364 GARR CERT Security Alert - subscribe/unsubscribe: http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert -----BEGIN PGP SIGNATURE----- iF0EAREIAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCaeXRowAKCRDBnEyTZRJg QqNcAKDBJ/kWmE5cS8VUIcMXac2XmQskoQCfWALbu7i5TzB3D2U20efGXxGINe0= =8j20 -----END PGP SIGNATURE-----