CVE-2014-4114
HIGH KEVMS14-060 Microsoft Windows OLE Package Manager Code Execution
Title source: metasploitDescription
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
Exploits (8)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows_x86
https://www.exploit-db.com/exploits/35020
exploitdb
WORKING POC
by Mike Czumak · pythonremotewindows
https://www.exploit-db.com/exploits/35055
metasploit
WORKING POC
EXCELLENT
by Unknown, sinn3r, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/ms14_060_sandworm.rb
exploitdb
WORKING POC
by Vlad Ovtchinikov · pythonlocalwindows
https://www.exploit-db.com/exploits/35019
metasploit
WORKING POC
EXCELLENT
by Haifei Li, sinn3r, juan vazquez · rubypocpython
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/ms14_064_packager_python.rb
References (11)
Scores
CVSS v3
7.8
EPSS
0.9235
EPSS Percentile
99.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2022-03-03
VulnCheck KEV
2014-10-14
InTheWild.io
2014-10-14
ENISA EUVD
EUVD-2014-4045
Classification
Status
draft
Affected Products (10)
microsoft/windows_7
microsoft/windows_8
microsoft/windows_8.1
microsoft/windows_rt
microsoft/windows_rt_8.1
microsoft/windows_server_2008
microsoft/windows_server_2008
microsoft/windows_server_2012
microsoft/windows_server_2012
microsoft/windows_vista
Timeline
Published
Oct 15, 2014
KEV Added
Mar 03, 2022
Tracked Since
Feb 18, 2026