![]() ![]() ![]() ![]() Per Microsoft’s advisory, disabling the MSDT URL protocol has proven to be the most effective workaround. Microsoft has made available several workarounds temporary fixes that can prevent in-application calling. To date, there’s no official fix to the MSDT vulnerability. During data transmission, an interceding threat actor could obtain local user privileges in order to run malicious arbitrary code on the host machine.įurthermore, according to Microsoft, if successfully exploited, the vulnerability would grant an attacker the same type of privileges (e.g., delete data, modify data, view data, or create a new account) as the ‘calling’ application. Upon interaction, the user will get redirected to MS’s Support via an URL protocol. What is CVE-2022-30190?ĬVE-2022-30190 is a remote code execution vulnerability found to affect hosts that call upon MSDT from applications such as Word or Excel. In the meantime, Microsoft advises users to implement workarounds. Microsoft is currently working on a permanent fix, but no timeline has been made available. According to the note, the vulnerability is related to the in-app calling of MSDT (Microsoft Support Diagnostic Tool) via an URL protocol. ![]() On Monday, Microsoft’s Security Response Center issued an advisory on CVE-2022-30190, a newly-discovered zero-day vulnerability that may enable threat actors to run arbitrary code with user-type rights. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |