MSHTML Engine Remote Code Execution Vulnerability
CVE-2020-1567

4.2MEDIUM

Key Information:

Vendor
Microsoft
Vendor
CVE Published:
17 August 2020

Summary

A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input. An attacker could execute arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a HTML editing attack scenario, an attacker could trick a user into editing a specially crafted file that is designed to exploit the vulnerability. The security update addresses the vulnerability by modifying how MSHTML engine validates input.

Affected Version(s)

Internet Explorer 11 Windows 10 Version 2004 for 32-bit Systems 1.0.0

Internet Explorer 9 Windows Server 2008 for 32-bit Systems Service Pack 2 1.0.0

References

EPSS Score

2% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
4.2
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.