CVE-2020-0878

KEV
Published: Set 11, 2020 Last Modified: Feb 23, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,2
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: none
MEDIUM 5,1
Access Vector: network
Access Complexity: high
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial

Description

AI Translation Available

<p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers, and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically via an enticement in email or instant message, or by getting them to open an email attachment.</p>
<p>The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.</p>

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0982
Percentile
0,9th
Updated

EPSS Score Trend (Last 91 Days)

787

Out-of-bounds Write

Draft
Common Consequences
Security Scopes Affected:
Integrity Availability Other
Potential Impacts:
Modify Memory Execute Unauthorized Code Or Commands Dos: Crash, Exit, Or Restart Unexpected State
Applicable Platforms
Languages: Assembly, C, C++, Memory-Unsafe
Technologies: ICS/OT
View CWE Details
Application

Edge by Microsoft

cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chakracore by Microsoft

cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Internet Explorer by Microsoft

cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Internet Explorer by Microsoft

cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020…
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0878
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0878