CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction
#1
Exclamation 
Quote:
[Image: abstract_digital_mosaic-1200x600.jpg]

At the end of May, researchers from the nao_sec team reported a new zero-day vulnerability in Microsoft Support Diagnostic Tool (MSDT) that can be exploited using Microsoft Office documents. It allowed attackers to remotely execute code on Windows systems, while the victim could not even open the document containing the exploit, or open it in Protected Mode. The vulnerability, which the researchers dubbed Follina, later received the identifier CVE-2022-30190.

CVE-2022-30190 technical details

Briefly, the exploitation of the CVE-2022-30190 vulnerability can be described as follows. The attacker creates an MS Office document with a link to an external malicious OLE object (word/_rels/document.xml.rels), such as an HTML file located on a remote server. The data used to describe the link is placed in the tag with attributes Type=”http://schemas.openxmlformats.org/officeDocument/2006/relationships/oleObject”, Target=”http_malicious_link!”. The link in the Target attribute points to the above-mentioned HTML file, inside which a malicious script is written using a special URI scheme.

When opened, the attacker-created document runs MSDT. The attacker can then pass, through a set of parameters, any command to this tool for execution on the victim’s system with the privileges of the user who opened the document. What is more, the command can be passed even if the document is opened in Protected Mode and macros are disabled.

At the time of posting, two document formats were known to allow CVE-2022-30190 exploitation: Microsoft Word (.docx) and Rich Text Format (.rtf). The latter is more dangerous for the potential victim because it allows execution of a malicious command even without opening the document — just previewing it in Windows Explorer is enough.

Protecting against Follina

Kaspersky is aware of attempts to exploit the CVE-2022-30190 vulnerability through Microsoft Office documents. Our solutions protect against this using the Behavior Detection and Exploit Prevention tools.

The following verdict names are possible:
  • PDM:Exploit.Win32.Generic
  • HEUR:Exploit.MSOffice.Agent.n
  • HEUR:Exploit.MSOffice.Agent.gen
  • HEUR:Exploit.MSOffice.CVE-2017-0199.a
  • HEUR:Exploit.MSOffice.CVE-2021-40444.a
  • HEUR:Exploit.MSOffice.Generic
Geography of Follina exploitation attempts with Exploit.MSOffice.CVE-2021-40444.a verdict, May 1 – June 3, 2022 (download)

We expect to see more Follina exploitation attempts to gain access to corporate resources, including for ransomware attacks and data breaches. Therefore, we continue to closely monitor the situation and improve overall vulnerability detection. In addition, as part of the Managed Detection and Response service, our SOC experts can detect vulnerability exploitation, investigate attacks and provide clients with all necessary threat-related information.

To protect against Follina exploitation, we strongly advise that you follow Microsoft’s own guidelines: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability. In particular, to prevent exploitation of this vulnerability, you can disable support for the MSDT URL protocol by taking these steps:
  1. Run Command Prompt as Administrator.
  2. To back up the registry key, execute the command “reg export HKEY_CLASSES_ROOT\ms-msdt filename”
  3. Execute the command “reg delete HKEY_CLASSES_ROOT\ms-msdt /f”.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Sandboxie 1.15.6 / 5.70.6
Release v1.15.6 / ...harlan4096 — 10:09
NVIDIA releases GeForce Hotfix 572.24 dr...
GeForce RTX 50 wit...harlan4096 — 10:06
AMD releases FSR 3.1.3 and Anti-Lag 2 pl...
AMD has updated pl...harlan4096 — 10:04
Microsoft Is Killing Its ‘Free’ VPN—And ...
Microsoft has anno...harlan4096 — 10:03
Microsoft Removes Information about Wind...
Microsoft has quie...harlan4096 — 10:02

[-]
Birthdays
Today's Birthdays
avatar (45)delsreehRob
avatar (43)pyotrded
Upcoming Birthdays
avatar (46)hapedDow
avatar (45)komriwat
avatar (37)showercurtains
avatar (48)PeterWhink
avatar (49)neuthrusBub
avatar (40)oecmecodo
avatar (39)ShakitaSmobe
avatar (48)tsorenHievy
avatar (45)myhotseeve
avatar (45)Edwinmub
avatar (45)dimaWeami
avatar (40)svoyaEnuct
avatar (38)TranoTymn
avatar (38)MezirLal
avatar (49)listfquoto
avatar (45)dima6sarPrave
avatar (37)Michaelaburi
avatar (45)dpascoal
avatar (50)Ronaldduh
avatar (38)legalgauch
avatar (40)yposegij
avatar (43)Baihu
avatar (26)RaseinsLikes

[-]
Online Staff
There are no staff members currently online.

>