CVE-2020-0674
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Description
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
Analysis
Internet Explorer scripting engine contains a use-after-free vulnerability allowing remote code execution through crafted web pages, exploited as a zero-day in January 2020 in targeted campaigns attributed to DarkHotel APT.
Technical Context
The CWE-416 use-after-free in jscript.dll occurs during garbage collection of JavaScript objects. A crafted sequence of operations triggers freeing of an object while still referenced, allowing heap manipulation for arbitrary code execution.
Affected Products
['Microsoft Internet Explorer (JScript engine)', 'All Windows versions running IE']
Remediation
Migrate away from IE entirely. Apply Microsoft security update. Restrict IE usage to explicitly required intranet sites via Enterprise Mode.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today