CVE-2014-4113

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1,...

Basic Information

CVE State
PUBLISHED
Reserved Date
June 12, 2014
Published Date
October 15, 2014
Last Updated
February 10, 2025
Vendor
n/a
Product
n/a
Description
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."

CVSS Scores

CVSS v3.1

7.8 - HIGH

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2022-05-04 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2016-01-22 07:05:52 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-05-04 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

ms14_058_track_popup_menu

Type: metasploit • Created: Unknown

Metasploit module for CVE-2014-4113

sam-b/CVE-2014-4113

Type: github • Created: 2016-02-07 14:18:45 UTC • Stars: 42

Trigger and exploit code for CVE-2014-4113

nsxz/Exploit-CVE-2014-4113

Type: github • Created: 2016-01-22 07:05:52 UTC • Stars: 5

Exploit CVE-2014-4113

johnjohnsp1/CVE-2014-4113

Type: github • Created: 2014-11-19 04:26:33 UTC • Stars: 3

PowerShell CVE-2014-4113