CVE-2014-4148
critical-risk
Published 2014-10-15
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted TrueType font, as exploited in the wild in October 2014, aka "TrueType Font Parsing Remote Code Execution Vulnerability."
Do I need to act?
!
49.7% chance of exploitation in next 30 days
EPSS score — higher than 50% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (11)
Affected Vendors
References (11)
Broken Link
http://secunia.com/advisories/60970
Broken Link
http://www.securityfocus.com/bid/70429
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/96995
Broken Link
http://secunia.com/advisories/60970
Broken Link
http://www.securityfocus.com/bid/70429
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/96995
71
/ 100
critical-risk
Severity
30/34 · Critical
Exploitability
25/34 · High
Exposure
16/34 · Moderate