CVE-2020-1380

Scores

EPSS

0.917high91.7%
0%20%40%60%80%100%

Percentile: 91.7%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS 2.0
7.6

Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Description

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked “safe for initialization” in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.
The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

msrcnvd

CWEs

CWE-787

Related Vulnerabilities

Exploits

Exploit ID: CVE-2020-1380

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Vulnerable Software (57)

Type: Configuration

Vendor: *

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator":...

Source: nvd

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 19041.450

Operating System: Windows 19041 build 450

Identifier: KB4566782

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 18362.1016

Operating System: Windows 18362 build 1016

Identifier: KB4565351

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 16299.2045

Operating System: Windows 16299 build 2045

Identifier: KB4571741

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 16299.2107

Operating System: Windows 16299 build 2107

Identifier: KB4577041

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 16299.2166

Operating System: Windows 16299 build 2166

Identifier: KB4580328

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 17763.1397

Operating System: Windows 17763 build 1397

Identifier: KB4565349

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 17134.1667

Operating System: Windows 17134 build 1667

Identifier: KB4571709

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4571703

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4571687

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: v1.001

Operating System: Windows 0 build 1

Identifier: KB5005563

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 1.001

Operating System: Windows 1 build 1

Identifier: KB5043049

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5075944

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5000800

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5015805

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 1.000

Operating System: Windows 1 build 0

Identifier: KB5065435

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 1.000

Operating System: Windows 1 build 0

Identifier: KB5060996

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.0.0

Operating System: Windows 0 build 0

Identifier: KB5029243

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 1.001

Operating System: Windows 1 build 1

Identifier: KB5033376

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5004233

Source: msrc