CVE-2014-4114
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Tags
Description
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
Analysis
Windows OLE improperly handles objects in Office documents, allowing remote code execution through crafted OLE objects. Known as the 'Sandworm' attack vector, exploited by Russian APT groups from June through October 2014.
Technical Context
The vulnerability allows attackers to embed malicious OLE objects in PowerPoint (.ppsx) files that, when opened, download and execute arbitrary code. The exploit leverages Windows' OLE packager to fetch remote content via INF file references, bypassing typical code execution restrictions.
Affected Products
['Microsoft Windows Vista SP2', 'Microsoft Windows Server 2008 SP2/R2 SP1', 'Microsoft Windows 7 SP1', 'Microsoft Windows 8/8.1', 'Microsoft Windows Server 2012/R2', 'Microsoft Windows RT/RT 8.1']
Remediation
Apply Microsoft security update MS14-060. Disable OLE object loading in Office. Block PPSX files with embedded OLE objects at email gateways. Monitor for BlackEnergy indicators of compromise.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today