Share via


Microsoft Edge known issues

This article tracks the known issues, workarounds, and fixes for Microsoft Edge.

High impact issues

These issues are high impact as identified by Customer Service & Support. Check this article often as the Microsoft Edge team provides workarounds and fixes.

The following table lists the issues that the Microsoft Edge team is tracking closely, working on, or resolved.

Version Symptom Workaround Comment
142 Starting in Microsoft Edge Stable version 142.0.3595.65, some third-party applications may fail to start msedge.exe while using cmd /K cd /d %ProgramFiles(x86)%\Microsoft\Edge\Application && start msedge <url> from a command prompt window. Roll back to Microsoft Edge Stable version 142.0.3595.53. This issue is fixed in Microsoft Edge stable release 142.0.3595.76.
142 Enterprise customers may encounter reload in IE mode entry points removed from the UI in user's devices. As announced Securing the Future: Changes to Internet Explorer Mode in Microsoft Edge | Microsoft Browser Vulnerability Research UI entry points to reload a site manually in IE mode have been removed from consumer devices by default. This change has completed with the release of Edge 142 Stable.

This change doesn't impact enterprise customers when their devices are configured properly under group policy InternetExplorerIntegrationLevel.
142 Starting in Microsoft Edge Beta version 142.0.3595.11, customers may experience a browser crash if the SearchSuggestEnabled policy is configured. Roll back to Microsoft Edge Beta version 141.0.3537.57 or temporarily remove the SearchSuggestEnabled policy. This issue is fixed in Microsoft Edge Beta release 142.0.3595.19.
142 Some customers may unexpectedly start seeing the sidepane open with context for their Teams and Outlook links. In Microsoft Edge 142, the auto-open feature is temporarily rolled back and users may find if the sidebar was turned off (not visible), Microsoft Edge may auto-open Teams or Outlook context in the sidepane. • Users can manually toggle off the auto-open context experience in Microsoft Edge settings (Copilot and sidebar/App and notification settings/Teams + Outlook).
• Admins can turn off the Auto-Open experience by using either of these policies:
 1. HubsSidebarEnabled: Set as "False"
 2. ExtensionSettings: sidebar_auto_open_blocked flag set as "True"
N/A In the Microsoft Edge management service (Microsoft Edge page in the Microsoft 365 Admin Center), customers may see an error message about cloud policy configurations failing to load. Multiple refreshes may temporarily resolve this. This issue is fixed for the Microsoft Edge management service.
140 Starting in Microsoft Edge Stable version 140.0.3485.54, customers may find after launching Microsoft Edge 1-3 times it triggers an unexpected browser exit. Clearing %AppData%\Local\Microsoft\Edge\User Data\Default\Sync Data\ may temporarily resolve the issue or deleting and recreating the user profile may also temporarily correct the issue. This issue is fixed in Microsoft Edge stable release 140.0.3485.66.
N/A When Microsoft Edge is installed, it includes the Microsoft.MicrosoftEdge.Stable host package. This package is a browser host package and enables platform functionality that would otherwise be unavailable to the browser as a Win32 application (System Notifications, Taskbar/Start pinning with UWP-like features, etc.). It isn't recommended to remove it.

Customers may observe that the host package is an older version than the current browser version.
This is expected behavior and doesn't indicate any security vulnerability. Additionally, it doesn't imply Microsoft Edge nor any other component is out of date. The host package is updated independently when it's detected that the package is either in a bad state or a new feature is added to the host package. 
137 Starting in Microsoft Edge Stable version 137.0.3296.52, customers may encounter unexpected leading spaces in the browser window title, which can break automation workflow for non-English language environments. This issue is fixed in Microsoft Edge stable release 137.0.3296.58. 
136 Starting in Microsoft Edge Stable version 136.0.3240.50, some text isn't displayed, and rendering is broken when viewing certain PDF files containing Japanese fonts. Note: This issue occurs when the system has fonts with Japanese file names installed. This issue only occurs with the new Adobe Acrobat powered built-in PDF reader. Enterprise administrators can temporarily avoid the issue by disabling the NewPDFReaderEnabled policy. Each user can also temporarily avoid the issue by disabling the New PDF Viewer in edge://flags/#edge-new-pdf-viewer. This issue is fixed in Microsoft Edge stable release 136.0.3240.92. 
136 On the Microsoft Edge New Tab Page (NTP), customers may see differing feeds.  Even when NTP policies are configured, users may have the Discover or My Feed selected.  The NTP issue and Microsoft 365 admin center configuration issue has been fixed.
136 For users with the 'Auto hidden' sidebar visibility setting, their Outlook or Teams link may not be showing the sidepane content as expected. This issue is fixed in Microsoft Edge stable release 137.0.3296.52. 
136 Microsoft Editor (spell checker) doesn’t offer suggestions for misspelled words The issue was identified in Microsoft Editor. Users that need spell checking assistance, can rely on the Basic functionality. This can be enabled under edge://settings/languages or via Group Policy using the MicrosoftEditorProofingEnabled policy. This issue is fixed in Microsoft Edge stable release 136.0.3240.64. 
135 Customers may see an issue where the first-run experience (FRE) page edge://welcome-new-device opens and fails with an error message page that doesn't close. This occurs when FRE is disabled and might be triggered suddenly after upgrade. Roll back Microsoft Edge to version 134.0.3124.95 or modify the HideFirstRunExperience policy to “0”. This issue is fixed in Microsoft Edge stable release 135.0.3179.85. 
134 Starting in version 134, customers may encounter an issue that affects extensions that bring up a window. The extension may get paused in the background if the window is minimized or occluded if the extension is meant to keep running always. Enterprise administrators can avoid the issue by disabling the Sleeping Tabs feature using the SleepingTabsEnabled policy, or by adding the extension path in the SleepingTabsBlockedForUrls. This issue is fixed in Microsoft Edge stable release 136.0.3240.92. Also, see Microsoft Edge v134 Sleeping Tabs feature affects the UiPath extensions 22.10, 23.4 and 23.10
134 Enterprise users with Multifactor Authentication (MFA) and Conditional Access (CA) may see popups when they start the Microsoft Edge browser. Recognizing the broad impact this issue is having, Microsoft is working to temporarily mitigate this issue through the Experimentation and Configuration Service (ECS). To receive the mitigation, admins should either not configure the ExperimentationAndConfigurationServiceControl policy or set the policy to "FullMode" or "ConfigurationsOnlyMode".
134 Enterprise users with MFA and CA may not have Single Sign-on (SSO) with Microsoft 365 Copilot Chat. The user may see a "sign in" button. The user may see a "sign in" button when they try to use Copilot.
134 Customers may not be able to start the Microsoft Edge browser programmatically using --inprivate and --app (application mode) via the command line because the browser crashes. Customers can start the browser using "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.contoso.com --inprivate. Alternatively, they can roll back to Microsoft Edge version 133.0.3065.92. This issue is fixed in Microsoft Edge stable release 134.0.3124.83.
133 Customers may not be able to start the sync functionality or open AIP-protected PDF files in Microsoft Edge. A bug in version 133 caused excessive traffic to the MIP service. For sync: "sign out (keeping locally saved data)" then "sign in" again. For AIP-protected PDFs, use Azure Information Protection Viewer. This issue is fixed in Microsoft Edge stable release 133.0.3065.69. Note: For some users, it may still be necessary to sign out and sign in again.
130 In version 130.0.2849.46, nonspecial scheme URL handling was updated to align with the URL Standard, which may affect site compatibility. Don't configure or set ExperimentationAndConfigurationServiceControl to "FullMode" or "ConfigurationsOnlyMode". Alternatively, roll back to version 129.0.2792.89. Microsoft temporarily disabled this feature via ECS. A browser restart is needed. A code change in version 130.0.2849.80 also disables it if ECS blocked by policy. Note: Re-enabled in version 133.0.3065.10+.
124 Specific HTTPS websites may show ERR_CONNECTION_ABORTED or ERR_SSL_PROTOCOL_ERROR. Linked to the "TLS 1.3 hybridized Kyber support" feature. Disable Kyber via edge://flags/#enable-tls13-kyber. Enterprises can use the PostQuantumKeyAgreementEnabled policy. Registry: [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Edge] (DWORD) "PostQuantumKeyAgreementEnabled"=0 This workaround is temporary and will be removed in future versions. Disabling weakens TLS security.
121 Specific HTTPS websites may show ERR_SSL_KEY_USAGE_INCOMPATIBLE, caused by enforcing X.509 key usage extensions. Set the RSAKeyUsageForLocalAnchorsEnabled policy. Registry: [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Edge] (DWORD) "RSAKeyUsageForLocalAnchorsEnabled"=0 This policy isn't effective in Microsoft Edge version 124 and later.
120 Microsoft Edge opens HTTP URLs as HTTPS when the server supports HTTPS. This is due to the "HttpsDefault" feature. Use the HttpsUpgradesEnabled policy to disable automatic HTTPS. Previously, the AutomaticHttpsDefault policy was used, but it has been deprecated in Microsoft Edge version 136. Registry: [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Edge] (DWORD) "HttpsUpgradesEnabled"=0. To disable per-site, use InsecureContentAllowedForUrls.
119 Specific HTTPS websites may show ERR_SSL_PROTOCOL_ERROR due to removal of SHA-1 in TLS handshakes. Set InsecureHashesInTLSHandshakesEnabled policy. Registry: [HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Edge] (DWORD) "InsecureHashesInTLSHandshakesEnabled"=1 This policy was removed in version 124+. Enabling this increases impersonation risk.