CVE-2014-4148
ENISA EUVD: EUVD-2014-4079 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 5, 2026
1 article
Published: 2014-10-15
EPSS Score
Source: FIRST.org · 2026-05-23
59.72%
probability
This CVE has a 59.72% probability
of being exploited in the next 30 days.
0%
Top 98.3th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)8.8
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v2 (legacy)
9.3
HIGH
Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
AV:N/AC:M/Au:N/C:C/I:C/A:C
Description
VulnerabilityLookup (CNA)win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted TrueType font, as exploited in the wild in October 2014, aka "TrueType Font Parsing Remote Code Execution Vulnerability."
Affected Products
n/a
n/a
Attack Intelligence
Google Project Zero
Patched
Oct. 14, 2014
Reported by
FireEye, Inc.
Root Cause Analysis
???
http://secunia.com/advisories/60970
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/70429
vdb-entry
x_refsource_BID
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-058
vendor-advisory
x_refsource_MS
https://exchange.xforce.ibmcloud.com/vulnerabilities/96995
vdb-entry
x_refsource_XF
Signal Intelligence
Confidence
95%
EPSS
59.72%
CVSS v3.1
8.8
Mentions
1
CNA Information
CNA Assigner
microsoft
Analyst Note
Auto-imported from Google Project Zero — confirmed zero-day by definition.
Triage Info
Decided atMar 05, 2026
Published DateOct 15, 2014