CVE-2020-0811

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected systems by exploiting a memory corruption flaw in the Chakra scripting engine in Microsoft Edge. Attackers could compromise user systems by tricking victims into visiting malicious websites. This affects users running vulnerable versions of Microsoft Edge on Windows systems.

💻 Affected Systems

Products:
  • Microsoft Edge (EdgeHTML-based)
Versions: Versions prior to the February 2020 security update
Operating Systems: Windows 10, Windows Server 2016, Windows Server 2019
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects EdgeHTML-based Edge, not Chromium-based Edge. Requires JavaScript execution capability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the victim's computer, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Browser compromise leading to session hijacking, credential theft, and installation of malware or spyware on the user's system.

🟢

If Mitigated

Limited impact with browser sandboxing containing the exploit, potentially resulting in browser crash but not full system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious website) but no authentication. Memory corruption vulnerabilities in JavaScript engines are frequently exploited in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Microsoft Edge version with February 2020 security updates

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0811

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Check for updates. 3. Install all available updates. 4. Restart computer if prompted. 5. Verify Edge version is updated.

🔧 Temporary Workarounds

Disable JavaScript

windows

Prevents exploitation by disabling JavaScript execution in Edge

Use Chromium-based Edge

windows

Switch to Chromium-based Microsoft Edge which is not affected

🧯 If You Can't Patch

  • Restrict user access to untrusted websites using web filtering solutions
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Edge version: edge://settings/help or Settings > About Microsoft Edge

Check Version:

msedge --version

Verify Fix Applied:

Verify Edge version is updated to post-February 2020 build and check Windows Update history for KB4532693 or later

📡 Detection & Monitoring

Log Indicators:

  • Edge crash reports with memory access violations
  • Unexpected process creation from Edge
  • Suspicious JavaScript execution patterns

Network Indicators:

  • Connections to known malicious domains from Edge
  • Unusual outbound traffic patterns

SIEM Query:

source="Microsoft-Windows-Security-Auditing" EventCode=4688 NewProcessName="*\cmd.exe" OR NewProcessName="*\powershell.exe" ParentProcessName="*\msedge.exe"

🔗 References

📤 Share & Export