Privilege escalation in Microsoft Windows

Published: 2014-10-14 | Updated: 2017-03-10
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2014-4113
Exploitation vector Local
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software
Windows Server
Operating systems & Components / Operating system

Operating systems & Components / Operating system

Vendor Microsoft

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Privilege escalation


Risk: Medium


CVE-ID: CVE-2014-4113

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes


The vulnerability allows a local attacker to obtain elevated privileges on the target system.

The weakness exists due to improper handling of objects in memory by kernel-mode driver (win32k.sys). A local attacker can run a specially crafted application to gain elevated privileges and take complete control of the system.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.


Install update from vendor's website.

Vulnerable software versions

Windows Server: 2003 - 2012 R2

Windows: 7 - Vista

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?