CVE-2020-0673

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected systems by exploiting a memory corruption flaw in Internet Explorer's scripting engine. Attackers can compromise systems by tricking users into viewing specially crafted web content. Users running vulnerable versions of Internet Explorer on Windows systems are affected.

💻 Affected Systems

Products:
  • Internet Explorer
Versions: Internet Explorer 9, 10, and 11
Operating Systems: Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012, Windows Server 2016, Windows Server 2019
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Internet Explorer versions on supported Windows systems are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Malware installation, credential theft, or system takeover when users visit malicious websites or open malicious documents.

🟢

If Mitigated

Limited impact with proper security controls like application whitelisting, least privilege accounts, and network segmentation.

🌐 Internet-Facing: HIGH - Exploitable through web browsing, which is common for internet-facing systems.
🏢 Internal Only: MEDIUM - Lower risk if users don't browse untrusted sites internally, but still vulnerable to phishing or malicious documents.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (visiting malicious website or opening malicious document). Multiple proof-of-concept exploits have been published.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in January 2020 (KB4534297 for Windows 10, KB4534293 for Windows 8.1, etc.)

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0673

Restart Required: Yes

Instructions:

1. Apply Microsoft's January 2020 security updates through Windows Update. 2. For enterprise environments, deploy patches via WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable JScript.dll access

windows

Restrict access to JScript.dll to prevent exploitation of the scripting engine vulnerability.

takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N

Use alternative browser

windows

Switch to Microsoft Edge or other modern browsers that are not affected by this vulnerability.

🧯 If You Can't Patch

  • Implement application control policies to block execution of unauthorized scripts and binaries.
  • Configure Internet Explorer to run in Enhanced Security Configuration mode and restrict access to untrusted websites.

🔍 How to Verify

Check if Vulnerable:

Check Internet Explorer version (Help > About Internet Explorer) and compare against affected versions (9, 10, 11). Verify Windows has not applied January 2020 security updates.

Check Version:

wmic qfe list | findstr KB4534297

Verify Fix Applied:

Verify Windows Update history shows January 2020 security updates installed (KB4534297, KB4534293, or other relevant KBs).

📡 Detection & Monitoring

Log Indicators:

  • Internet Explorer crash logs with jscript.dll or vbscript.dll modules
  • Windows Event Logs showing unexpected process creation from iexplore.exe

Network Indicators:

  • HTTP requests to known exploit domains or unusual script downloads
  • Outbound connections from Internet Explorer to unexpected IP addresses

SIEM Query:

source="Windows Security" EventID=4688 AND (NewProcessName="*cmd.exe" OR NewProcessName="*powershell.exe") AND ParentProcessName="*iexplore.exe"

🔗 References

📤 Share & Export