CVE-2020-0674

high

Description

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.

From the Tenable Blog

CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild
CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild

Published: 2020-01-20

Zero-day remote code execution vulnerability in Internet Explorer has been observed in attacks. Background On January 17, Microsoft released an out-of-band advisory (ADV200001) for a zero-day remote code execution (RCE) in Internet Explorer that has been exploited in the wild.

References

https://www.tenable.com/cyber-exposure/2020-threat-landscape-retrospective

https://www.tenable.com/blog/how-covid-19-response-is-expanding-the-cyberattack-surface

https://www.tenable.com/blog/microsoft-s-february-2020-patch-tuesday-addresses-99-cves-including-internet-explorer-zero-day

https://www.tenable.com/blog/cve-2020-0674-internet-explorer-remote-code-execution-vulnerability-exploited-in-the-wild

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0674

https://github.com/maxpl0it/CVE-2020-0674-Exploit

http://packetstormsecurity.com/files/162565/Microsoft-Internet-Explorer-8-11-Use-After-Free.html

http://packetstormsecurity.com/files/161309/Microsoft-Internet-Explorer-11-Use-After-Free.html

http://packetstormsecurity.com/files/159137/Microsoft-Internet-Explorer-11-Use-After-Free.html

Details

Source: Mitre, NVD

Published: 2020-02-11

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High