INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 3h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 4h Global phishing Multiple sectors HIGH 4h Global insider Cybersecurity Services CRITICAL 4h Global ransomware Multiple sectors (U.S. companies) CRITICAL 4h Global malware Financial Services, Cryptocurrency CRITICAL 5h Global malware Technology and Cloud Services HIGH 5h Global general Financial Services and E-commerce MEDIUM 5h Global data_breach Social Media and Communications CRITICAL 5h Global general Cybersecurity Operations HIGH 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 3h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 4h Global phishing Multiple sectors HIGH 4h Global insider Cybersecurity Services CRITICAL 4h Global ransomware Multiple sectors (U.S. companies) CRITICAL 4h Global malware Financial Services, Cryptocurrency CRITICAL 5h Global malware Technology and Cloud Services HIGH 5h Global general Financial Services and E-commerce MEDIUM 5h Global data_breach Social Media and Communications CRITICAL 5h Global general Cybersecurity Operations HIGH 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 3h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 4h Global phishing Multiple sectors HIGH 4h Global insider Cybersecurity Services CRITICAL 4h Global ransomware Multiple sectors (U.S. companies) CRITICAL 4h Global malware Financial Services, Cryptocurrency CRITICAL 5h Global malware Technology and Cloud Services HIGH 5h Global general Financial Services and E-commerce MEDIUM 5h Global data_breach Social Media and Communications CRITICAL 5h Global general Cybersecurity Operations HIGH 6h
Vulnerabilities

CVE-2020-0674

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability — Microsoft Internet Explorer contains a memory corruption vulnerability due to the way the Scripting Engine handles object
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability — Microsoft Internet Explorer contains a memory corruption vulnerability due to the way the Scripting Engine handles objects in memory. Successful exploitation could allow remote code execution in the context of the current user.

🤖 AI Executive Summary

CVE-2020-0674 is a critical memory corruption vulnerability in the Internet Explorer Scripting Engine (jscript.dll) that allows remote code execution when a user visits a malicious webpage. Exploited in the wild as a zero-day at time of disclosure, this vulnerability enables attackers to execute arbitrary code with the privileges of the current user. If the user is logged in as an administrator, full system compromise is possible. The availability of public exploits makes this an immediate and severe threat requiring urgent remediation.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 17, 2026 10:16
🇸🇦 Saudi Arabia Impact Assessment
هذه الثغرة تمثل خطراً بالغاً على المؤسسات السعودية في عدة قطاعات: القطاع الحكومي (الجهات الخاضعة لإشراف هيئة الاتصالات وتقنية المعلومات والهيئة الوطنية للأمن السيبراني) التي قد تستخدم أنظمة قديمة تعتمد على Internet Explorer لتطبيقات الإنترانت والبوابات الحكومية. القطاع المصرفي والمالي الخاضع لإشراف ساما قد يكون عرضة للخطر إذا كانت محطات العمل تعمل بإصدارات قديمة من Windows مع IE. قطاع الطاقة بما فيه أرامكو السعودية وسابك قد يمتلك أنظمة تحكم صناعية وشبكات OT تعتمد على IE للوصول إلى واجهات الإدارة. قطاع الرعاية الصحية والاتصالات (STC، زين، موبايلي) معرض أيضاً في حال استخدام تطبيقات الويب القديمة. يُعدّ هذا الاستغلال مثالياً لحملات التصيد الاحتيالي الموجّه (Spear Phishing) التي تستهدف موظفي المؤسسات السعودية.
🏢 Affected Saudi Sectors
Government Banking Energy Healthcare Telecom Education Defense Critical Infrastructure
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (0-24 hours):
1. Apply Microsoft Security Update KB4534251 (or the applicable cumulative update for your Windows version) immediately via Windows Update or WSUS.
2. If patching is not immediately possible, apply the workaround: restrict access to jscript.dll by running: cacls %windir%\system32\jscript.dll /E /P everyone:N
3. Set Internet Explorer Security Zone settings to 'High' for Internet and Local Intranet zones to disable Active Scripting.
4. Enable Enhanced Protected Mode in Internet Explorer.

PATCHING GUIDANCE:
- Windows 7 SP1: KB4534251 (ESU required) or KB4534310
- Windows 8.1: KB4534297 or KB4534309
- Windows 10: KB4534271, KB4534276, KB4534306
- Windows Server 2008/2012/2016/2019: Apply respective cumulative updates from January 2020 Patch Tuesday.

COMPENSATING CONTROLS:
1. Block IE from accessing the internet via Group Policy or firewall rules.
2. Deploy Microsoft EMET or Windows Defender Exploit Guard with Attack Surface Reduction rules enabled.
3. Enforce least privilege — ensure users do not run as local administrators.
4. Deploy web proxy with URL filtering to block known malicious domains.
5. Consider migrating users to Microsoft Edge or Chrome as default browser.

DETECTION RULES:
1. Monitor for unusual child processes spawned by iexplore.exe (e.g., cmd.exe, powershell.exe, wscript.exe).
2. Enable Windows Defender ATP / Microsoft Defender for Endpoint alerts for CVE-2020-0674.
3. SIEM rule: Alert on jscript.dll loading in unusual process contexts.
4. Network IDS/IPS: Deploy Snare/Suricata rules for CVE-2020-0674 exploit traffic patterns.
5. Monitor for lateral movement following any IE process anomalies.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 0-24 ساعة):
1. تطبيق تحديث الأمان KB4534251 من Microsoft فوراً عبر Windows Update أو WSUS.
2. إذا تعذّر التحديث الفوري، تطبيق الحل البديل: تقييد الوصول إلى jscript.dll بتشغيل الأمر: cacls %windir%\system32\jscript.dll /E /P everyone:N
3. رفع مستوى أمان منطقة الإنترنت والإنترانت المحلية في Internet Explorer إلى 'عالٍ' لتعطيل البرمجة النصية النشطة.
4. تفعيل وضع الحماية المحسّنة في Internet Explorer.

إرشادات التصحيح:
- Windows 7 SP1: KB4534251 أو KB4534310
- Windows 8.1: KB4534297 أو KB4534309
- Windows 10: KB4534271، KB4534276، KB4534306
- Windows Server: تطبيق التحديثات التراكمية المقابلة من Patch Tuesday يناير 2020.

ضوابط التعويض:
1. حظر وصول IE إلى الإنترنت عبر Group Policy أو قواعد جدار الحماية.
2. نشر Windows Defender Exploit Guard مع تفعيل قواعد تقليل سطح الهجوم.
3. تطبيق مبدأ الصلاحيات الدنيا — التأكد من عدم تشغيل المستخدمين بصلاحيات المسؤول المحلي.
4. نشر وكيل ويب مع تصفية URL لحظر النطاقات الضارة المعروفة.
5. الانتقال إلى Microsoft Edge أو Chrome كمتصفح افتراضي.

قواعد الكشف:
1. مراقبة العمليات الفرعية غير المعتادة الصادرة عن iexplore.exe.
2. تفعيل تنبيهات Microsoft Defender for Endpoint للثغرة CVE-2020-0674.
3. قاعدة SIEM: تنبيه عند تحميل jscript.dll في سياقات عمليات غير معتادة.
4. نشر قواعد IDS/IPS للكشف عن أنماط استغلال الثغرة.
5. مراقبة الحركة الجانبية عقب أي شذوذ في عمليات IE.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Patch Management and Vulnerability Management ECC-2-3-1: Secure Configuration Management ECC-2-5-1: Malware Protection ECC-2-6-1: Vulnerability and Patch Management ECC-3-3-3: Web Browsing Security Controls
🔵 SAMA CSF
Cybersecurity Operations — Vulnerability Management (3.3.5) Cybersecurity Operations — Patch Management (3.3.6) Endpoint Security — Workstation Hardening Threat and Vulnerability Management Domain Incident Management and Response
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities A.8.7 — Protection against malware A.8.9 — Configuration management A.5.30 — ICT readiness for business continuity A.8.19 — Installation of software on operational systems
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components are protected from known vulnerabilities by installing applicable security patches Requirement 6.2.4 — Software engineering techniques to prevent common vulnerabilities Requirement 5.2 — Malicious software (malware) is prevented or detected and addressed Requirement 12.3.2 — Targeted risk analysis for technology usage
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Internet Explorer
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS93.64%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 3
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.