Rule Category

BROWSER-IE -- Snort has detected traffic known to exploit vulnerabilities present in the Internet Explorer browser, or products that have the Trident or Tasman engines.

Alert Message

BROWSER-IE Microsoft Edge memory corruption attempt

Rule Explanation

This rule alerts when an attempt to exploit a JavaScript based vulnerability occurs. These attacks are commonly used to exploit a victims browser, and may lead to remote code being executed on a victim machine.

What To Look For

This alert occurs when an attacker attempts to exploit CVE-2020-0824.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Execution

Technique: Exploitation for Client Execution

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

CVE

Additional Links

CVE Additional Information

CVE-2020-0824
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'.
Details
SeverityHIGH Base Score7.6
Impact Score10.0 Exploit Score4.9
Confidentiality ImpactCOMPLETE Integrity ImpactCOMPLETE
Availability ImpactCOMPLETE Access VectorNETWORK
AuthenticationNONE Ease of AccessHIGH