Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-17058 : Security Advisory and Response

Learn about CVE-2020-17058, a critical Microsoft Browser Memory Corruption Vulnerability allowing Remote Code Execution. Find out affected systems, exploitation risks, and mitigation steps.

This CVE article provides details about the Microsoft Browser Memory Corruption Vulnerability affecting Internet Explorer 11 and Microsoft Edge (EdgeHTML-based).

Understanding CVE-2020-17058

This vulnerability was published on November 10, 2020, with a CVSS base severity of HIGH (7.5).

What is CVE-2020-17058?

The Microsoft Browser Memory Corruption Vulnerability allows for Remote Code Execution.

The Impact of CVE-2020-17058

The vulnerability poses a significant risk as it can lead to unauthorized remote code execution on affected systems.

Technical Details of CVE-2020-17058

This section covers specific technical aspects of the vulnerability.

Vulnerability Description

The vulnerability involves memory corruption in Microsoft browsers, enabling attackers to execute arbitrary code remotely.

Affected Systems and Versions

        Internet Explorer 11 on various Windows versions
        Microsoft Edge (EdgeHTML-based) on specified Windows versions

Exploitation Mechanism

Attackers can exploit this vulnerability by crafting malicious web content, leading to memory corruption and potential code execution.

Mitigation and Prevention

Protecting systems from CVE-2020-17058 is crucial to prevent exploitation and maintain security.

Immediate Steps to Take

        Apply security patches provided by Microsoft promptly.
        Consider using alternative browsers until patches are applied.

Long-Term Security Practices

        Regularly update browsers and operating systems to mitigate future vulnerabilities.
        Implement network security measures to detect and block malicious activities.

Patching and Updates

Regularly check for and apply security updates from Microsoft to address CVE-2020-17058.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now