New Microsoft Edge Android Flaw Enables Spoofing Attacks


TL;DR

  • Security Flaw: Microsoft disclosed CVE-2026-0391, a UI misrepresentation vulnerability in Edge for Android, on February 5, 2026.
  • Attack Method: The flaw enables network spoofing attacks where attackers manipulate browser interface elements to deceive users.
  • Risk Level: The vulnerability carries a CVSS score of 6.5 (Medium) with high confidentiality impact for credential theft.
  • User Impact: Attackers can spoof legitimate websites to trick users into entering credentials on malicious phishing pages.

Microsoft has warned users about a user interface misrepresentation vulnerability in Edge for Android that enables attackers to spoof network communications and deceive users into revealing sensitive information. +The company disclosed the flaw, tracked as CVE-2026-0391, through the Microsoft Security Response Center on February 5.

Only the Chromium-based version of Edge for Android is affected. This vulnerability allows attackers to manipulate browser interface elements to create convincing phishing pages that mimic legitimate websites.

“User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.”

Microsoft Security Response Center (via Security Update Guide)

The unauthorized attacker can perform spoofing attacks over a network by manipulating how the browser displays key information. This UI misrepresentation issue allows malicious actors to deceive users into entering credentials or personal data into attacker-controlled sites.

The disclosure arrives amid rising mobile-targeted phishing campaigns that exploit compressed browser interfaces. As desktop security controls harden against traditional attacks, threat actors increasingly target mobile workflows. Smaller screens and touch-centric interactions create exploitable gaps in user verification that this vulnerability specifically targets.

Vulnerability Details and Attack Mechanism

To understand how attackers exploit this flaw, security analysts examined the specific interface elements that enable deception.

The core problem is that key information displayed in the UI can be manipulated or misrepresented, leading to potential deception.