⚠ Actively exploited
Added to CISA KEV on 2022-03-03. Federal agencies required to patch by 2022-03-24. Required action: Apply updates per vendor instructions..
CVE-2014-4114 — Improper Input Validation in Microsoft Windows Server 2008
Severity
7.8HIGHNVD
EPSS
92.1%
top 0.29%
CISA KEV
KEV
Added 2022-03-03
Due 2022-03-24
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedOct 15
KEV addedMar 3
KEV dueMar 24
Latest updateJan 19
CISA Required Action: Apply updates per vendor instructions.
Description
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages1 packages
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-3hff-6c4j-j2w5: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8↗2022-05-14
VulnCheck
▶
💥Exploits & PoCs
7Exploit-DB
▶
Exploit-DB▶
Microsoft Windows - OLE Package Manager Code Execution (via Python) (MS14-064) (Metasploit)↗2014-11-14
Exploit-DB
▶
🔍Detection Rules
1📋Vendor Advisories
1CISA
▶
🕵️Threat Intelligence
24📄Research Papers
4arXiv▶
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures↗2025-02-12