CVE-2020-1180

4.2 MEDIUM

📋 TL;DR

This is a remote code execution vulnerability in the ChakraCore JavaScript engine that allows attackers to execute arbitrary code with the privileges of the current user. It affects systems running applications that use ChakraCore, particularly Microsoft Edge (legacy version) and applications embedding ChakraCore. Successful exploitation could lead to complete system compromise if the user has administrative rights.

💻 Affected Systems

Products:
  • Microsoft Edge (legacy)
  • Applications using ChakraCore
Versions: ChakraCore versions prior to the security update
Operating Systems: Windows 10, Windows Server 2016, Windows Server 2019
Default Config Vulnerable: ⚠️ Yes
Notes: Primarily affects the legacy Microsoft Edge browser (EdgeHTML-based) and applications that embed ChakraCore scripting engine.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, allowing installation of malware, data theft/modification, and creation of new accounts.

🟠

Likely Case

Arbitrary code execution in the context of the current user, potentially leading to lateral movement within a network or privilege escalation.

🟢

If Mitigated

Limited impact if users run with minimal privileges, applications are sandboxed, or network segmentation prevents lateral movement.

🌐 Internet-Facing: MEDIUM - Exploitation requires user interaction (visiting malicious website) but could affect browsers/embedded applications exposed to untrusted content.
🏢 Internal Only: LOW - Primarily affects client-side applications; less relevant for internal-only servers unless they run vulnerable applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires user interaction (such as visiting a malicious website) and involves memory corruption techniques. No publicly available exploit code was identified at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security update released by Microsoft (specific version depends on OS/build)

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1180

Restart Required: Yes

Instructions:

1. Apply the latest Windows security updates via Windows Update. 2. For applications using ChakraCore, update to the patched version. 3. Restart affected systems after patching.

🔧 Temporary Workarounds

Disable JavaScript in Edge (legacy)

windows

Prevents execution of malicious JavaScript that could trigger the vulnerability

Not applicable - configure via browser settings

Use alternative browser

all

Switch to Microsoft Edge (Chromium-based) or other modern browsers not affected by this vulnerability

🧯 If You Can't Patch

  • Run applications with minimal user privileges (non-admin accounts)
  • Implement application sandboxing or isolation where possible

🔍 How to Verify

Check if Vulnerable:

Check if using legacy Microsoft Edge or applications with ChakraCore, and verify they haven't received the security update.

Check Version:

For Edge: edge://version/ ; For Windows: systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history shows the relevant security update installed, or check application/ChakraCore version against patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes in Edge/ChakraCore applications
  • Suspicious JavaScript execution patterns

Network Indicators:

  • Connections to known malicious domains serving exploit code

SIEM Query:

Process creation events from edge.exe or chakra.dll with unusual command-line arguments or parent processes

🔗 References

📤 Share & Export