VYPR
High severityNVD Advisory· Published Sep 11, 2020· Updated Aug 4, 2024

Scripting Engine Memory Corruption Vulnerability

CVE-2020-1172

Description

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ChakraCore scripting engine mishandles objects in memory, allowing remote code execution with user privileges.

Vulnerability

Overview

CVE-2020-1172 is a remote code execution vulnerability in the ChakraCore scripting engine, which is used by Microsoft Edge and other applications. The flaw arises from the way ChakraCore handles objects in memory, leading to memory corruption that an attacker can exploit to execute arbitrary code in the context of the current user [1][2]. The root cause is an improper object-handling routine that can be triggered by specially crafted web content.

Exploitation

Prerequisites

An attacker would need to host a malicious website (or inject content into a compromised site) that contains JavaScript designed to trigger the memory corruption. No authentication is required; the victim simply visits the page. The vulnerability can be exploited remotely over the network, and the attacker gains code execution at the privilege level of the user running the browser or application that uses ChakraCore [2].

Impact

Successful exploitation allows the attacker to perform actions as the current user. If that user has administrative rights, the attacker can take full control of the system, install programs, view/change/delete data, or create new accounts with full user rights [2]. The impact is limited to the user's permissions, but in many enterprise scenarios users have elevated privileges, making this a critical risk.

Mitigation

Microsoft released a security update in September 2020 that modifies how ChakraCore handles objects in memory, fixing the vulnerability [1]. Users should apply the update via Windows Update or by updating any software that embeds ChakraCore. No workarounds are documented; the only mitigation is to install the patch.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Microsoft.ChakraCoreNuGet
< 1.11.221.11.22

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.