Zero-day vulnerability in Windows

Improper input validation

The zero-day vulnerability is being claimed to have been used in early September in possible campaigns against NATO, Ukrainian government organizations, Western European government organization, Energy Sector firms (specifically in Poland), European telecommunications firms, United States academic organizations.
Files in the SandWorm exploit hilighted by iSIGHT Partners include a malicious executable from a known malware family, namely the BlackEnergy Trojan.

Known malware:

Dyreza Trojan.
BlackEnergy Trojan.

Vulnerability details

Advisory: SB2014101403 - Remote code execution in Microsoft Windows

Vulnerable component: Windows

CVE-ID: CVE-2014-4114

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-20 - Improper Input Validation


The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when processing OLE objects. A remote attacker can create a specially crafted OLE object, attach it to a document (e.g. PowerPoint file), trick the victim into opening it and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.

Known APT campaigns:

Sandworm - attacks against NATO, European government organizations, and U.S. academic organizations

The campaign goes back to December 2013.

The hackers used Sandworm malware.

Public Exploits: