microsoft windows-server-2008 CVE-2014-4077 vulnerability in Microsoft Products
Published on November 11, 2014

product logo product logo
Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Office 2007 SP3, when IMJPDCT.EXE (aka IME for Japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted PDF document, aka "Microsoft IME (Japanese) Elevation of Privilege Vulnerability," as exploited in the wild in 2014.

Vendor Advisory NVD

Known Exploited Vulnerability

This Microsoft IME Japanese Privilege Escalation Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Input Method Editor (IME) Japanese is a keyboard with Japanese characters that can be enabled on Windows systems as it is included by default (with the default set as disabled). IME Japanese contains an unspecified vulnerability when IMJPDCT.EXE (IME for Japanese) is installed which allows attackers to bypass a sandbox and perform privilege escalation.

The following remediation steps are recommended / required by June 15, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2014-4077 can be exploited with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Products Associated with CVE-2014-4077

Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.

 
 
 
 
 

Exploit Probability

EPSS
34.27%
Percentile
96.89%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.