Follina – Exploitation of Windows Support Diagnostic Tool – CVE-2022-30190

CVE-2022-30190

Discovered: 5/30/2022

Impacted Tech: 

Microsoft Support Diagnostic Tool (MSDT) 

Attacker Location: Local

Highlights:

A vulnerability in Microsoft Support Diagnostic Tool (MSDT) allows attackers to remotely execute code on Windows systems. This vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word.

Attackers who successfully exploit this vulnerability can run arbitrary code with the privileges of the calling application, and can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.

Remediation:

Microsoft has released an official workaround. Administrators and users should disable the MSDT URL protocol by:

  1. Run Command Prompt as Administrator
  2. To back up the registry key, execute the command reg export HKEY_CLASSES_ROOT\ms-msdt filename 
  3. Execute the command reg delete HKEY_CLASSES_ROOT\ms-msdt /f

To undo the workaround:

  1. Run the command prompt as administrator
  2. To restore the registry key, execute the command reg import filename

Read more about the vulnerability via the Microsoft Security Response Center link below.

References:

Microsoft Security Response Center

Leave a comment