Microsoft has issued a security advisory- ADV200001 yesterday against a new zero-day vulnerability discovered in the Internet Explorer and it is also being actively exploited in the wild by attackers. Affected versions include Internet Explorer 9, 10, and 11 in Windows 7, Windows 8.1, and Windows 10. The vulnerability is CVE-2020-0674, which is a remote code execution vulnerability and is triggered when the JScript.dll library is being triggered by the scripting engine while accessing the memory.
Once this vulnerability CVE-2020-0674 is exploited, the attackers will be able to take control of the machines by executing arbitrary codes and gain exact access as the perceived user. If the user is logged in as the administrator, then the attacker will have complete access to the machines where he can add or remove users as per his wish, changes passwords, etc.
Microsoft is already aware of this zero day being exploited in the wild and is working on a patch to fix this vulnerability.
Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019 runs with Enhanced Security Configurations. This feature will not restrict a user or an administrator from running a crafted web content on the server, but it does apply only to the non trusted websites that have not been added to the Internet Explorer.
However, Microsoft has also given a workaround until the patch is made available.
The solution is to restrict Script.dll from running, and this could resolve the zero day temporarily.
For 32 bit system do the following in the command prompt,
takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N
For 64 bit system do the following in the command prompt,
takeown /f %windir%\syswow64\jscript.dll
cacls %windir%\syswow64\jscript.dll /E /P everyone:N
takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N
Since we have restricted the usage of JScript.dll certain features or websites that may be using JScript.dll may not work properly. Please understand, only sites that utilizes Jscript as the scripting engine is being affected by this vulnerability.
Patch would be the permanent fix for this vulnerability, please revert the above mitigation before deploying the patch to the systems.
For 32 bits system,
cacls %windir%\system32\jscript.dll /E /R everyone
For 64 bits system,
cacls %windir%\system32\jscript.dll /E /R everyone
cacls %windir%\syswow64\jscript.dll /E /R everyone
Remember patches are the only permanent remedies for zero-day vulnerabilities. Revert the mitigation and deploy the patches as soon as Microsoft releases it.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…
View Comments
Like!! I blog quite often and I genuinely thank you for your information. The article has truly peaked my interest.