CVE-2014-7136
K7 Computing Multiple Products K7FWFilt.sys Privilege Escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the K7FWFilt.sys kernel mode driver (aka K7Firewall Packet Driver) before 14.0.1.16, as used in multiple K7 Computing products, allows local users to execute arbitrary code with kernel privileges via a crafted parameter in a DeviceIoControl API call.
Desbordamiento de buffer basado en memoria dinámica en el controlador del modo de kernel K7FWFilt.sys (también conocido como K7Firewall Packet Driver) anterior a 14.0.1.16, utilizado en múltiples productos de K7 Computing, permite a usuarios locales ejecutar código arbitrario con privilegios de kernel a través de un parámetro manipulado en una llamada API DeviceIoControl.
Latest, and possibly earlier versions of K7FWFilt.sys kernel mode driver, also named as the 'K7Firewall Packet Driver', suffers from a heap overflow condition that can be exploited locally by an attacker in order to execute code with kernel privileges. Successful exploitation of this bug results in vertical privilege escalation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-09-21 CVE Reserved
- 2014-12-10 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-04-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
K7computing Search vendor "K7computing" | K7firewall Packet Driver Search vendor "K7computing" for product "K7firewall Packet Driver" | <= 14.0.1.15 Search vendor "K7computing" for product "K7firewall Packet Driver" and version " <= 14.0.1.15" | - |
Affected
|