CVE-2014-6352

HIGH
2014-10-22 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Added to CISA KEV
Oct 22, 2025 - 01:16 cisa
CISA KEV
PoC Detected
Oct 22, 2025 - 01:16 vuln.today
Public exploit code
Patch Released
Oct 22, 2025 - 01:16 nvd
Patch available
CVE Published
Oct 22, 2014 - 14:55 nvd
HIGH 7.8

Description

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object, as exploited in the wild in October 2014 with a crafted PowerPoint document.

Analysis

Windows OLE improperly handles crafted OLE objects in PowerPoint, allowing remote attackers to execute arbitrary code. This is a variant of the Sandworm OLE attack discovered in October 2014 via crafted PowerPoint presentations.

Technical Context

Similar to CVE-2014-4114, this vulnerability exploits Windows OLE's handling of embedded objects in PowerPoint files. The attacker embeds a crafted OLE object that triggers code execution during document processing, but through a different code path than the original Sandworm flaw.

Affected Products

['Microsoft Windows Vista SP2 through Windows 8.1', 'Microsoft Windows Server 2008 SP2 through Server 2012 R2', 'Microsoft Windows RT/RT 8.1']

Remediation

Apply Microsoft security update MS14-064 (which addresses both CVE-2014-4114 and CVE-2014-6352). Implement application whitelisting to prevent OLE-triggered code execution.

Priority Score

210
Low Medium High Critical
KEV: +50
EPSS: +90.7
CVSS: +39
POC: +20

Share

CVE-2014-6352 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy