First published: Thu May 21 2020(Updated: )
A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input.An attacker could execute arbitrary code in the context of the current user, aka 'MSHTML Engine Remote Code Execution Vulnerability'.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =9 | |
Microsoft Windows Server 2008 | =sp2 | |
Microsoft Internet Explorer | =11 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT 8.1 | ||
Microsoft Windows Server 2008 | =r2-sp1 | |
Microsoft Windows Server 2012 | ||
Microsoft Windows Server 2012 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1064 is a remote code execution vulnerability in the MSHTML engine that allows an attacker to execute arbitrary code in the context of the current user.
Microsoft Internet Explorer versions 9 and 11 are affected by CVE-2020-1064.
CVE-2020-1064 has a severity rating of 7.5, which is considered high.
To fix CVE-2020-1064, it is recommended to apply the latest security updates provided by Microsoft.
You can find more information about CVE-2020-1064 on the Microsoft Security Guidance page: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1064