CVE-2020-1380
📋 TL;DR
CVE-2020-1380 is a remote code execution vulnerability in Internet Explorer's scripting engine that allows attackers to execute arbitrary code by exploiting memory corruption. It affects users running vulnerable versions of Internet Explorer, particularly those who browse untrusted websites or open malicious Office documents. Successful exploitation gives attackers the same privileges as the current user, which could lead to full system compromise if the user has administrative rights.
💻 Affected Systems
- Internet Explorer
- Microsoft Office (when using IE rendering engine)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with administrative privileges, allowing installation of malware, data theft, and creation of new accounts.
Likely Case
Malware installation or data theft through drive-by downloads when users visit compromised websites.
If Mitigated
Limited impact if users have restricted privileges and security controls block malicious content.
🎯 Exploit Status
Exploit code is publicly available and has been used in real-world attacks. Exploitation requires user interaction (visiting malicious website or opening document).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: August 2020 security updates (KB4565351 for Windows 10, KB4565483 for Windows 8.1, etc.)
Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1380
Restart Required: Yes
Instructions:
1. Apply August 2020 Microsoft security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Verify updates are installed and restart systems as required.
🔧 Temporary Workarounds
Disable Internet Explorer
windowsDisable Internet Explorer browser to prevent exploitation through web browsing.
Disable-WindowsOptionalFeature -Online -FeatureName Internet-Explorer-Optional-amd64
Restrict ActiveX controls
windowsConfigure Internet Explorer to disable or prompt for ActiveX controls.
Set via Group Policy: Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Security Features > Add-on Management > Turn off ActiveX controls
🧯 If You Can't Patch
- Use alternative browsers like Microsoft Edge or Chrome instead of Internet Explorer.
- Implement application whitelisting to prevent execution of unauthorized code.
🔍 How to Verify
Check if Vulnerable:
Check if August 2020 security updates are installed via 'wmic qfe list' or 'Get-Hotfix -Id KB4565351' (adjust KB number for your OS).
Check Version:
wmic qfe list | findstr KB4565351 (or appropriate KB number for your OS)
Verify Fix Applied:
Verify the specific KB patch for your Windows version is installed and Internet Explorer version is updated.
📡 Detection & Monitoring
Log Indicators:
- Internet Explorer crash logs (jscript9.dll)
- Windows Event Logs with Application Error events for iexplore.exe
- Unexpected process creation from Internet Explorer
Network Indicators:
- HTTP requests to known malicious domains hosting exploit code
- Downloads of suspicious scripts or ActiveX controls
SIEM Query:
EventID=1000 AND SourceName='Application Error' AND ProcessName='iexplore.exe' AND FaultModuleName='jscript9.dll'
🔗 References
- http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1380
- http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1380
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1380