CVE-2020-17053

7.5 HIGH

📋 TL;DR

This is a memory corruption vulnerability in Internet Explorer that could allow an attacker to execute arbitrary code on a victim's system. It affects users who run Internet Explorer on Windows systems. An attacker could exploit this by tricking a user into viewing a specially crafted webpage.

💻 Affected Systems

Products:
  • Internet Explorer
Versions: Internet Explorer 11 on Windows 10, Windows Server 2016, Windows Server 2019
Operating Systems: Windows 10, Windows Server 2016, Windows Server 2019
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Internet Explorer 11, not Microsoft Edge. Windows 7 and Windows 8.1 are not affected as they received separate updates.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the same privileges as the current user, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Arbitrary code execution in the context of the logged-in user, allowing installation of malware, credential theft, or lateral movement within a network.

🟢

If Mitigated

Limited impact if systems are fully patched, users have limited privileges, and security controls like application whitelisting are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting a malicious website). No public proof-of-concept was available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: November 2020 Security Update for Internet Explorer

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17053

Restart Required: Yes

Instructions:

1. Apply the November 2020 security update for Windows. 2. For Windows 10 and Windows Server 2016/2019, use Windows Update or download from Microsoft Update Catalog. 3. Restart the system after installation.

🔧 Temporary Workarounds

Disable Internet Explorer

windows

Disable Internet Explorer through Windows Features or Group Policy if not required.

Optional: dism /online /Disable-Feature /FeatureName:Internet-Explorer-Optional-amd64

Use Enhanced Security Configuration

windows

Enable Internet Explorer Enhanced Security Configuration (IE ESC) to restrict scripting and active content.

🧯 If You Can't Patch

  • Restrict Internet Explorer usage through application control policies
  • Implement network segmentation to limit lateral movement if compromised

🔍 How to Verify

Check if Vulnerable:

Check if Internet Explorer 11 is installed and if November 2020 security updates are missing via Windows Update history or systeminfo command.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify that KB4586781 (Windows 10 2004/20H2) or equivalent November 2020 cumulative update is installed.

📡 Detection & Monitoring

Log Indicators:

  • Internet Explorer crash logs (Event ID 1000)
  • Unexpected process execution from iexplore.exe

Network Indicators:

  • Unusual outbound connections from systems using Internet Explorer
  • Traffic to known malicious domains

SIEM Query:

EventID=1000 AND SourceName="Application Error" AND ProcessName="iexplore.exe"

🔗 References

📤 Share & Export