Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Exploited Vulnerability in Microsoft Support Diagnostic Tool (MSDT)

Issued: 
Wednesday, 1 June, 2022
Last Revision: 
Wednesday, 1 June, 2022
Vendor: 
Severity Level: 
Summary: 

Microsoft Support Diagnostic Tool (MSDT) has been found to have a vulnerability that might allow arbitrary code execution. MSDT gathers data from Windows and Windows Server hosts and sends it to Microsoft Support.

 

MSDT can be accessed via the URL protocol from a calling application such as Word, allowing an attacker to execute arbitrary code with the user's rights.

 

The successful exploitation of this vulnerability could lead to the execution of arbitrary code. An attacker might then install programs, read, alter, or remove data, or create new accounts with full user rights, depending on the privileges associated with the user. Users whose accounts are set up with fewer user privileges on the system may be less affected than those with administrative user rights.

 

This vulnerability, named "Follina" and tagged as CVE-2022-30190, has been widely disclosed and exploited. Attackers are able to execute arbitrary code, through the use of infected word documents.

 

CVE/Vulnerability

   Description 

CVSS3.0 Score

CVE-2022-30190

 Remote Code Execution Vulnerability

7.8

 

Table 1: Vulnerability details 

 

CVE/Vulnerability 

Affected Product(s)

CVE-2022-30190

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2

Windows RT 8.1

Windows 8.1 for x64-based systems

Windows 8.1 for 32-bit systems

Windows 7 for x64-based Systems Service Pack 1

Windows 7 for 32-bit Systems Service Pack 1

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 for 32-bit Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 11 for ARM64-based Systems

Windows 11 for x64-based Systems

Windows Server, version 20H2 (Server Core Installation)

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 20H2 for x64-based Systems

Windows Server 2022 Azure Edition Core Hotpatch

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows 10 Version 21H1 for 32-bit Systems

Windows 10 Version 21H1 for ARM64-based Systems

Windows 10 Version 21H1 for x64-based Systems

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

 

Table 2: Vulnerable versions

 

 

Recommendation: 

 There is no official fix from Microsoft available for this vulnerability right now. Organization may apply workaround released by Microsoft for temporary protection, which disables the MSDT URL protocol and thus prevents exploitation. Please refer to links in refrences for Workaround suggested by Microsoft. 

 

After Microsoft issues a patch for CVE-2022-30190, you can undo the changes applied through workaround. To reverse the workaround, open a command prompt in elevated mode and type reg import filename (filename is the name of the registry backup created when disabling the protocol