• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Latest Cybersecurity News Windows security

A new zero-day vulnerability discovered in Internet Explorer

William Marshal Posted On January 19, 2020
1



Zero day vulnerability in Internet Explorer

Microsoft has issued a security advisory- ADV200001 yesterday against a new zero-day vulnerability discovered in the Internet Explorer and it is also being actively exploited in the wild by attackers. Affected versions include Internet Explorer 9, 10, and 11 in Windows 7, Windows 8.1, and Windows 10. The vulnerability is CVE-2020-0674, which is a remote code execution vulnerability and is triggered when the JScript.dll library is being triggered by the scripting engine while accessing the memory.

Breaking down CVE-2020-0674

Once this vulnerability CVE-2020-0674  is exploited, the attackers will be able to take control of the machines by executing arbitrary codes and gain exact access as the perceived user. If the user is logged in as the administrator, then the attacker will have complete access to the machines where he can add or remove users as per his wish, changes passwords, etc. 

Microsoft is already aware of this zero day being exploited in the wild and is working on a patch to fix this vulnerability. 

Mitigations

Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019 runs with Enhanced Security Configurations. This feature will not restrict a user or an administrator from running a crafted web content on the server, but it does apply only to the non trusted websites that have not been added to the Internet Explorer.

However, Microsoft has also given a workaround until the patch is made available.

Workaround

The solution is to restrict Script.dll from running, and this could resolve the zero day temporarily. 

For 32 bit system do the following in the command prompt,

takeown /f %windir%\system32\jscript.dll

cacls %windir%\system32\jscript.dll /E /P everyone:N

For 64 bit system do the following in the command prompt,

takeown /f %windir%\syswow64\jscript.dll

cacls %windir%\syswow64\jscript.dll /E /P everyone:N

takeown /f %windir%\system32\jscript.dll

cacls %windir%\system32\jscript.dll /E /P everyone:N

Impact of restricting Script.dll

Since we have restricted the usage of JScript.dll certain features or websites that may be using JScript.dll may not work properly. Please understand, only sites that utilizes Jscript as the scripting engine is being affected by this vulnerability. 

What is the permanent solution

Patch would be the permanent fix for this vulnerability, please revert the above mitigation before deploying the patch to the systems. 

Reverting the mitigation

For 32 bits system,

cacls %windir%\system32\jscript.dll /E /R everyone    

For 64 bits system,

cacls %windir%\system32\jscript.dll /E /R everyone    

cacls %windir%\syswow64\jscript.dll /E /R everyone

Remember patches are the only permanent remedies for zero-day vulnerabilities. Revert the mitigation and deploy the patches as soon as Microsoft releases it. 

Share the article with your friends


IE Zero dayIE zero day vulnerabilityInternet explorer zero daymicrosoft internet explorer zero day vulneabilityZero day IEzero day internet explorerzero day vulnerability in internet explorer


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

1 Comment

ปั้มไลค์
May 25, 2020 at 1:10 am
Reply

Like!! I blog quite often and I genuinely thank you for your information. The article has truly peaked my interest.


Leave a Reply to ปั้มไลค์ Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search