CVE-2020-0824

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected systems by exploiting memory corruption in Internet Explorer. Attackers can compromise user systems by tricking victims into viewing specially crafted web content. This affects users running vulnerable versions of Internet Explorer on Windows systems.

💻 Affected Systems

Products:
  • Internet Explorer
Versions: Internet Explorer 11
Operating Systems: Windows 10, Windows Server 2016, Windows Server 2019
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of Internet Explorer 11 on supported Windows versions. Edge browser is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, enabling data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Malware installation leading to credential theft, data exfiltration, or system disruption for individual users.

🟢

If Mitigated

Limited impact with proper security controls like application whitelisting, memory protection, and network segmentation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious website). No public exploit code was available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2020 Security Updates

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0824

Restart Required: Yes

Instructions:

1. Apply March 2020 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or SCCM. 3. Verify patch installation in Windows Update history.

🔧 Temporary Workarounds

Disable Internet Explorer

windows

Disable or restrict Internet Explorer usage in favor of Microsoft Edge or other modern browsers.

Disable via Group Policy: Computer Configuration > Administrative Templates > Windows Components > Internet Explorer

Enable Enhanced Protected Mode

windows

Enable Enhanced Protected Mode in Internet Explorer settings to add memory protection layers.

Internet Options > Advanced tab > Enable Enhanced Protected Mode

🧯 If You Can't Patch

  • Implement application control policies to block unauthorized code execution
  • Use network segmentation to isolate Internet Explorer usage to specific segments

🔍 How to Verify

Check if Vulnerable:

Check Internet Explorer version (Help > About) and compare with patched versions. Systems without March 2020 updates are vulnerable.

Check Version:

wmic qfe list | findstr KB4540673

Verify Fix Applied:

Verify KB4540673 (Windows 10) or equivalent March 2020 security update is installed via Windows Update history or 'wmic qfe list' command.

📡 Detection & Monitoring

Log Indicators:

  • Internet Explorer crash events in Windows Event Logs
  • Unexpected process creation from iexplore.exe
  • Memory access violation errors

Network Indicators:

  • Unusual outbound connections from Internet Explorer processes
  • Traffic to known malicious domains

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="iexplore.exe" | stats count by host

🔗 References

📤 Share & Export