NextFin

Indian Government Alerts Microsoft Edge Users on Critical Vulnerabilities, Urges Immediate Updates

NextFin News - In early December 2025, India’s Computer Emergency Response Team (CERT-In), the country's premier cybersecurity agency, issued a critical security warning to users of Microsoft Edge and other Microsoft products. The alert, released on November 14, 2025, centers on two major vulnerabilities: a remote code execution bug in the Microsoft Graphics Component (GDI+) and a severe flaw within the Chromium-based Microsoft Edge browser's JavaScript engine (V8). These weaknesses could allow malicious actors to execute code on targeted systems by tricking users into opening crafted files or visiting compromised web pages.

CERT-In identified that the first vulnerability affects multiple Windows platforms including Windows 10, Windows 11, various Windows Server versions, as well as Microsoft Office LTSC on Mac and Android. The underlying issue involves a heap-based buffer overflow that can be triggered by malicious metafiles. The second vulnerability targets Microsoft Edge versions older than 142.0.3595.80, exposing users to remotely exploitable code execution via crafted network requests to the V8 engine.

The Indian government’s advisory emphasizes urgency, recommending all Microsoft users inspect their system and browser versions and promptly apply Microsoft’s official security patches—specifically citing the CVE-2025-60724 update for the Graphics Component flaw. Microsoft Edge users are urged to manually verify and update their browsers to version 142.0.3595.80 or later, even though Edge typically updates automatically.

This alert comes amid a growing global trend of heightened cybersecurity threats exploiting widely used software platforms. According to industry data, remote code execution vulnerabilities in popular browser engines can lead to large-scale compromises, with hackers gaining control over devices to steal sensitive information, deploy ransomware, or pivot within networks.

The vulnerabilities reveal the complex challenges in securing integrated software ecosystems where core components like graphics processing and scripting engines interact deeply with the underlying operating system. The Microsoft GDI+ flaw signifies risks in legacy and contemporary Windows environments, while the Edge V8 engine vulnerability reflects the risks associated with rapid browser innovation driven by open-source projects like Chromium.

India’s CERT-In warning underscores the importance of proactive patch management strategies for both individual users and enterprise entities. Given the critical severity, the potential attack surface spans millions of endpoints domestically and globally, especially in sectors relying heavily on Microsoft technologies. Incomplete or delayed patching heightens exposure to automated and targeted cyberattacks, increasing risks of data breaches and operational disruptions.

From a forward-looking perspective, this incident exemplifies the growing necessity for coordinated public-private cybersecurity efforts. Governments are playing an increasingly active role in notifying users and issuing timely advisories, while technology providers like Microsoft face ongoing pressure to accelerate vulnerability discovery, disclosure, and patch deployment. This dynamic fosters a security-first mindset in software development life cycles, emphasizing resilience and rapid response.

Moreover, the Indian government's initiative reflects a broader geopolitical posture in strengthening digital defense capabilities amid escalating cyber conflict potentials. India’s digital economy expansion and reliance on ubiquitous Microsoft platforms make such security alerts a vital mechanism in national cybersecurity governance.

For users, the critical takeaway is clear: maintaining updated software versions is a foundational defense layer against rapidly evolving cyber threats. Enterprises should integrate automated vulnerability scanning and patch management within their security frameworks to reduce windows of exposure. Meanwhile, awareness campaigns educating end-users—often the weakest link in cybersecurity chains—are instrumental in minimizing risks associated with social engineering vectors frequently exploited through such vulnerabilities.

Overall, this Indian government alert on Microsoft Edge users not only highlights specific technical issues but also signals the ongoing systemic challenges and strategic imperatives in cybersecurity management for ubiquitous digital platforms in 2025 and beyond.

Explore more exclusive insights at nextfin.ai.

Open NextFin App