CVE-2020-1570
📋 TL;DR
A memory corruption vulnerability in Internet Explorer's scripting engine allows remote code execution when users visit malicious websites or open specially crafted documents. Attackers can execute arbitrary code with the same privileges as the current user, potentially leading to full system compromise if the user has administrative rights. This affects all systems running vulnerable versions of Internet Explorer.
💻 Affected Systems
- Internet Explorer
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with administrative privileges, allowing attackers to install malware, steal data, create backdoors, and pivot to other systems.
Likely Case
Malware installation and data theft through drive-by downloads when users visit compromised websites.
If Mitigated
Limited impact if users have restricted privileges, security software blocks malicious sites, and IE is not the default browser.
🎯 Exploit Status
Exploitation requires user interaction (visiting malicious site or opening malicious document). No public exploit code was available at disclosure.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: August 2020 Security Updates for Internet Explorer
Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1570
Restart Required: Yes
Instructions:
1. Apply August 2020 Internet Explorer cumulative security update via Windows Update. 2. For enterprise deployments, deploy through WSUS or SCCM. 3. Restart affected systems after patch installation.
🔧 Temporary Workarounds
Disable Internet Explorer
windowsRemove or disable Internet Explorer as the default browser to prevent exploitation through web attacks.
Disable-WindowsOptionalFeature -Online -FeatureName Internet-Explorer-Optional-amd64
Restrict ActiveX controls
windowsConfigure Internet Explorer to disable or prompt before running ActiveX controls.
Set Internet Explorer security zones to High or configure ActiveX settings via Group Policy
🧯 If You Can't Patch
- Implement application whitelisting to prevent unauthorized code execution
- Use Microsoft Enhanced Mitigation Experience Toolkit (EMET) or Windows Defender Exploit Guard to add memory protection
🔍 How to Verify
Check if Vulnerable:
Check if August 2020 Internet Explorer security update is installed via Windows Update history or systeminfo command.
Check Version:
reg query "HKLM\SOFTWARE\Microsoft\Internet Explorer" /v Version
Verify Fix Applied:
Verify KB4565351 (or later cumulative update) is installed and Internet Explorer version is updated.
📡 Detection & Monitoring
Log Indicators:
- Internet Explorer crash logs with memory access violations
- Windows Event Logs showing unexpected process creation from iexplore.exe
Network Indicators:
- Unusual outbound connections from systems after visiting websites
- Traffic to known malicious domains hosting exploit code
SIEM Query:
Process Creation where Parent Process contains "iexplore.exe" AND Command Line contains suspicious patterns