CVE-2014-6321Code Injection in Microsoft Windows Server 2008

CWE-94Code Injection11 documents7 sources
Severity
10.0CRITICALNVD
EPSS
93.0%
top 0.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 11
Latest updateNov 12

Description

Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via crafted packets, aka "Microsoft Schannel Remote Code Execution Vulnerability."

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fv59-6vgm-w859: Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 82022-05-13
VulnCheck
Microsoft Windows Improper Control of Generation of Code ('Code Injection')2014

🕵️Threat Intelligence

6
Unit42
Don’t Miss A Single Threat Intelligence Update from Unit 42!2014-12-29
Unit42
Don’t Miss A Single Threat Intelligence Update from Unit 42!2014-12-29
Unit42
DTLS Vulnerabilities in CVE-2014-63212014-12-10
Unit42
DTLS Vulnerabilities in CVE-2014-63212014-12-10
Talos
Microsoft Update Tuesday November 2014: Fixes for 3 0-day Vulnerabilities2014-11-11

📐Framework References

1
OWASP
Testing for Weak Transport Layer Security

📄Research Papers

1
arXiv
Large Language Models Are Unreliable for Cyber Threat Intelligence2025-11-12