Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-0980 : What You Need to Know

Learn about CVE-2018-0980, a critical remote code execution vulnerability affecting Microsoft Edge and ChakraCore due to memory corruption in the Chakra scripting engine. Find out the impacted systems and versions, exploitation details, and mitigation steps.

Microsoft Edge and ChakraCore are affected by a remote code execution vulnerability due to memory corruption in the Chakra scripting engine.

Understanding CVE-2018-0980

A critical vulnerability impacting Microsoft Edge and ChakraCore, leading to potential remote code execution.

What is CVE-2018-0980?

The vulnerability arises from how the Chakra scripting engine manages objects in memory, allowing malicious actors to execute arbitrary code.

The Impact of CVE-2018-0980

        Affected Systems: Microsoft Edge, ChakraCore
        Vulnerability Type: Remote Code Execution
        Versions: Various Windows 10 versions and Windows Server 2016
        Severity: Critical

Technical Details of CVE-2018-0980

The technical aspects of the vulnerability affecting Microsoft Edge and ChakraCore.

Vulnerability Description

The flaw enables attackers to exploit memory handling in the Chakra scripting engine, potentially executing unauthorized code.

Affected Systems and Versions

        Microsoft Edge on Windows 10 for 32-bit and x64-based Systems
        Windows 10 Versions 1511, 1607, 1703, and 1709
        Windows Server 2016

Exploitation Mechanism

Attackers can craft malicious objects to trigger memory corruption, leading to remote code execution.

Mitigation and Prevention

Measures to address and prevent the CVE-2018-0980 vulnerability.

Immediate Steps to Take

        Apply security updates from Microsoft promptly
        Consider using alternative browsers until patches are applied
        Monitor for any unusual activities on affected systems

Long-Term Security Practices

        Regularly update software and systems to mitigate future vulnerabilities
        Implement network security measures to detect and prevent malicious activities

Patching and Updates

        Install the latest security patches provided by Microsoft to address the vulnerability
        Keep systems up to date with the latest software releases

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now