⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-05-03.

CVE-2020-0878

Severity
7.5HIGH
EPSS
5.3%
top 10.01%
CISA KEV
KEVRansomware
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 11
KEV addedNov 3
KEV dueMay 3
Latest updateMay 24
CISA Required Action: Apply updates per vendor instructions.

Description

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then i

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:NExploitability: 1.6 | Impact: 2.5

Affected Packages5 packages

CVEListV5microsoft/chakracore< publication
CVEListV5microsoft/internet_explorer_91.0.0publication
CVEListV5microsoft/internet_explorer_111.0.0publication
CVEListV5microsoft/microsoft_edge_(edgehtml-based)1.0..0publication

Patches

🔴Vulnerability Details

3
GHSA
GHSA-6j33-6rqj-fh2m: A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vul2022-05-24
CVEList
Microsoft Browser Memory Corruption Vulnerability2020-09-11
VulnCheck
Microsoft Edge and Internet Explorer Memory Corruption Vulnerability2020

📋Vendor Advisories

2
CISA
Microsoft Edge and Internet Explorer Memory Corruption Vulnerability2021-11-03
Microsoft
Microsoft Browser Memory Corruption Vulnerability2020-09-08