INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 3h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 3h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 3h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2020-1380

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability — Microsoft Internet Explorer contains a memory corruption vulnerability which can allow for remote code execution in the c
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability — Microsoft Internet Explorer contains a memory corruption vulnerability which can allow for remote code execution in the context of the current user.

🤖 AI Executive Summary

CVE-2020-1380 is a critical memory corruption vulnerability in the Microsoft Internet Explorer Scripting Engine that allows remote code execution in the context of the current user. With a CVSS score of 9.0 and confirmed exploit availability, this vulnerability poses an immediate and severe threat to organizations still relying on Internet Explorer. An attacker can exploit this flaw by luring a user to a malicious webpage or embedding malicious content in documents that invoke the IE scripting engine. Immediate patching is essential as active exploitation has been observed in the wild.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 17:16
🇸🇦 Saudi Arabia Impact Assessment
تُعدّ هذه الثغرة ذات تأثير بالغ على المؤسسات السعودية التي لا تزال تستخدم Internet Explorer في بيئات العمل، ولا سيما القطاعات التالية: القطاع الحكومي (الجهات الخاضعة لإشراف هيئة الاتصالات وتقنية المعلومات والهيئة الوطنية للأمن السيبراني) التي كثيراً ما تعتمد على تطبيقات الويب القديمة المرتبطة بـ IE؛ القطاع المصرفي والمالي الخاضع لإشراف ساما حيث قد تستخدم بعض الأنظمة الداخلية IE؛ قطاع الطاقة بما فيه أرامكو السعودية وسابك حيث تعتمد أنظمة SCADA وبوابات الإنترانت القديمة على IE؛ وقطاع الرعاية الصحية الذي يستخدم أنظمة سجلات المرضى الإلكترونية المرتبطة بـ IE. يُشكّل الاستغلال النشط المؤكد خطراً مباشراً على المستخدمين النهائيين في هذه القطاعات، مما قد يؤدي إلى اختراق بيانات حساسة أو تصعيد الامتيازات داخل الشبكات المؤسسية.
🏢 Affected Saudi Sectors
Government Banking Energy Healthcare Telecom Education Defense
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Apply Microsoft Security Update KB4565503 (or the relevant cumulative update for your Windows version) immediately via Windows Update or WSUS.
2. Identify all systems still running Internet Explorer using asset inventory tools and prioritize patching.
3. Disable the Internet Explorer scripting engine as a compensating control if patching is not immediately possible: set the kill bit for the affected ActiveX controls.

PATCHING GUIDANCE:
4. Apply the August 2020 Patch Tuesday updates from Microsoft (MS20-AUG) across all Windows endpoints and servers.
5. For Windows Server environments running IE in compatibility mode, apply server-specific patches and test application compatibility.
6. Verify patch deployment using SCCM, Intune, or equivalent patch management tools.

COMPENSATING CONTROLS (if patching is delayed):
7. Block Internet Explorer from accessing the internet via Group Policy or firewall rules.
8. Migrate users to Microsoft Edge or another supported browser immediately.
9. Restrict execution of JScript.dll and VBScript.dll via AppLocker or Software Restriction Policies.
10. Enable Enhanced Protected Mode in Internet Explorer to limit damage from exploitation.

DETECTION RULES:
11. Monitor for unusual child processes spawned by iexplore.exe (e.g., cmd.exe, powershell.exe, wscript.exe).
12. Deploy YARA/Sigma rules targeting JScript memory corruption patterns and shellcode injection.
13. Enable Windows Defender Exploit Guard and Attack Surface Reduction (ASR) rules.
14. Monitor network traffic for connections to known malicious domains following IE process anomalies.
15. Review EDR/SIEM alerts for process injection or unusual memory allocation patterns in IE processes.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق تحديث الأمان KB4565503 من Microsoft (أو التحديث التراكمي المناسب لإصدار Windows لديك) فوراً عبر Windows Update أو WSUS.
2. تحديد جميع الأنظمة التي لا تزال تشغّل Internet Explorer باستخدام أدوات جرد الأصول وإعطاء الأولوية للتصحيح.
3. تعطيل محرك البرمجة النصية لـ IE كإجراء تعويضي إذا تعذّر التصحيح الفوري: ضبط kill bit لعناصر ActiveX المتأثرة.

إرشادات التصحيح:
4. تطبيق تحديثات Patch Tuesday لشهر أغسطس 2020 من Microsoft على جميع نقاط النهاية والخوادم.
5. بالنسبة لبيئات Windows Server التي تشغّل IE في وضع التوافق، تطبيق التصحيحات الخاصة بالخادم واختبار توافق التطبيقات.
6. التحقق من نشر التصحيح باستخدام SCCM أو Intune أو أدوات إدارة التصحيح المعادلة.

الضوابط التعويضية (في حال تأخر التصحيح):
7. حظر وصول Internet Explorer إلى الإنترنت عبر Group Policy أو قواعد جدار الحماية.
8. ترحيل المستخدمين فوراً إلى Microsoft Edge أو متصفح مدعوم آخر.
9. تقييد تنفيذ JScript.dll وVBScript.dll عبر AppLocker أو سياسات تقييد البرامج.
10. تفعيل وضع الحماية المحسّنة في Internet Explorer للحد من أضرار الاستغلال.

قواعد الكشف:
11. مراقبة العمليات الفرعية غير المعتادة التي تنشئها iexplore.exe مثل cmd.exe وpowershell.exe وwscript.exe.
12. نشر قواعد YARA/Sigma التي تستهدف أنماط تلف ذاكرة JScript وحقن shellcode.
13. تفعيل Windows Defender Exploit Guard وقواعد تقليل سطح الهجوم (ASR).
14. مراقبة حركة الشبكة للاتصالات بالنطاقات الضارة المعروفة عقب اكتشاف شذوذات في عمليات IE.
15. مراجعة تنبيهات EDR/SIEM لرصد حقن العمليات أو أنماط تخصيص الذاكرة غير المعتادة في عمليات IE.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Patch and vulnerability management ECC-2-3-1: Endpoint protection and hardening ECC-2-5-1: Secure configuration management ECC-3-3-3: Browser and client-side security controls ECC-1-3-6: Cybersecurity incident management
🔵 SAMA CSF
Cybersecurity Risk Management — Vulnerability and Patch Management Cybersecurity Operations — Endpoint Security Cybersecurity Operations — Threat and Vulnerability Management Cybersecurity Governance — Asset Management Cybersecurity Resilience — Incident Response
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities A.8.7 — Protection against malware A.8.9 — Configuration management A.8.19 — Installation of software on operational systems A.5.24 — Information security incident management planning and preparation A.8.16 — Monitoring activities
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components are protected from known vulnerabilities by installing applicable security patches Requirement 6.2.4 — Software engineering techniques to prevent or mitigate common software attacks Requirement 11.3 — External and internal vulnerability scanning Requirement 12.10 — Incident response plan
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Internet Explorer
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS91.73%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 3
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.