facebook hermes CVE-2020-1914 is a vulnerability in Facebook Hermes
Published on October 8, 2020

A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.

NVD

Weakness Type

Always-Incorrect Control Flow Implementation

The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated. This weakness captures cases in which a particular code segment is always incorrect with respect to the algorithm that it is implementing. For example, if a C programmer intends to include multiple statements in a single block but does not include the enclosing braces (CWE-483), then the logic is always incorrect. This issue is in contrast to most weaknesses in which the code usually behaves correctly, except when it is externally manipulated in malicious ways.


Products Associated with CVE-2020-1914

Want to know whenever a new CVE is published for Facebook Hermes? stack.watch will email you.

 

Affected Versions

Facebook Hermes Version commit prior to b2021df620824627f5a8c96615edbd1eb7fdddfc is affected by CVE-2020-1914

Exploit Probability

EPSS
0.85%
Percentile
74.61%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.