⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2022-05-03. Required action: Apply updates per vendor instructions..
Severity
7.5HIGH
EPSS
43.7%
top 2.48%
CISA KEV
KEV
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedApr 15
KEV addedNov 3
KEV dueMay 3
Latest updateMay 24
CISA Required Action: Apply updates per vendor instructions.

Description

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0970.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages24 packages

CVEListV5microsoft/internet_explorer_9Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2+1
CVEListV5microsoft/internet_explorer_1122 versions+21

Patches

🔴Vulnerability Details

6
GHSA
GHSA-m4v9-rc68-3qrf: A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engin2022-05-24
GHSA
ChakraCore Remote Code Execution Vulnerability2022-05-24
Project0
Déjà vu-lnerability - Project Zero2021-02-01
CVEList
CVE-2020-0968: A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engin2020-04-15
VulnCheck
Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability2020

📋Vendor Advisories

2
CISA
Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability2021-11-03
Microsoft
Scripting Engine Memory Corruption Vulnerability2020-04-14

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Code execution vulnerability in Microsoft Excel2020-02-11
Talos
Vulnerability Spotlight: Code execution vulnerability in Microsoft Excel2020-02-11