CVE-2020-0827
Description
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2020-0827 is a remote code execution vulnerability in ChakraCore caused by memory corruption during object handling.
Vulnerability
Overview CVE-2020-0827 is a remote code execution vulnerability in the ChakraCore scripting engine, which is used by Microsoft Edge (EdgeHTML-based) and other applications. The flaw lies in how the engine handles objects in memory, leading to a memory corruption condition that can be exploited [1]. This vulnerability is part of a group of similar scripting engine memory corruption issues disclosed in March 2020 [1].
Exploitation
Conditions To exploit this vulnerability, an attacker would need to host a specially crafted website and convince a victim to visit it, typically via social engineering or by compromising a legitimate site. The vulnerability can be triggered without any user interaction beyond browsing to the malicious page, as the ChakraCore engine processes the JavaScript content. No special authentication or privileges are required for the attack to succeed [1].
Impact
Successful exploitation allows an attacker to execute arbitrary code in the context of the current user. If the user has administrative rights, an attacker could then install programs, view/change/delete data, or create new accounts with full user rights. This makes it a high-severity issue for systems running vulnerable versions of Edge [1].
Mitigation and
Patch Status Microsoft released a security update for this vulnerability on March 10, 2020, as part of Patch Tuesday [1]. Users and administrators should apply the update immediately to protect against potential attacks. There are no known workarounds other than upgrading to the patched version [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.ChakraCoreNuGet | < 1.11.17 | 1.11.17 |
Affected products
23- Microsoft/ChakraCorev5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows Server 2016v5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows Server 2019v5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-7j34-xq9v-9mqgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-0827ghsaADVISORY
- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0827ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.