We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:VBS/CVE-2014-6332
Aliases: No associated aliases
Summary
Windows Defender detects and removes this threat.
This threat uses a Microsoft vulnerability to download and run files on your PC, including other malware.
It runs if you visit a website, and have a vulnerable operating system; the following software are affected:
- Windows 8.1
- Windows RT Gold and 8.1
- Windows 7 SP1
- Windows Server 2012 Gold and R2
- Windows Server 2008 SP2 and R2 SP1
- Windows Vista SP2
- Windows Server 2003 SP2
You might get an alert about this threat even if you're not using a vulnerable version of the application. This is because we detect when a website or file tries to use the vulnerability, even if it isn't successful.
Use the following free Microsoft software to detect and remove this threat:
- Microsoft Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista
- Microsoft Safety Scanner
You should also run a full scan. A full scan might find other, hidden malware.
Update software
You should make sure your software is up to date:
Get more help
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
If you’re using Windows XP, see our Windows XP end of support page.