Windows 10 Edge security easily bypassed through protocols

By

Browser has large, exploitable attack surface by design.

Microsoft's Edge browser responds to a range of built-in protocols that attackers can abuse to bypass security restrictions, to access files and run local apps remotely without user interaction.

Windows 10 Edge security easily bypassed through protocols

Edge is the default web browser in Microsoft's Windows 10 operating system. The software giant has boasted of its improved security improvements against sophisticated web-based attacks.

However, Argentinian security researcher Manuel Caballero discovered it is easy to get around Edge's security features thanks to flawed design.

Caballero embarked on his voyage of protocol discovery after clicking on a link in tweet from Microsoft's official and verified @MSEdgeDev account.

To his surprise, the link opened up the Windows Store app through Google Chrome, something that would normally require the browser requesting the user's permission before taking the action.

Further investigation by Caballero revealed that the shortened link the @MSEdgeDev account tweeted redirected to a protocol - ms-windows-store:// - that was associated with the Windows Store App in the Windows 10 registry system configuration database.

Caballero discovered other protocols in the registry that could be used to run local applications, read Windows system files, and open multiple tabs in Google Chrome, with the Edge browser.

He was also able to bypass the Edge HTML 5 sandbox security feature that restricts Javascript execution with the microsoft-edge:// protocol, and to crash the browser with the read:// protocol.

The read:// protocol could also be used to access and display files in the Windows 10 system32 directory through Edge, Caballero found.

"It’s a bad idea to let all those protocols run straight out of the box because the attack surface of Edge ends up being huge," he said.

Caballero has reported the issues to Microsoft's security response team.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

The Northern Beaches Women's Shelter hones focus on tech-enabled abuse

The Northern Beaches Women's Shelter hones focus on tech-enabled abuse

Log In

  |  Forgot your password?