QID 91909
Date Published: 2022-05-31
QID 91909: Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution (RCE) Vulnerability (Follina) (Zero Day)
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word.
QID Detection Logic (Authenticated):
This QID checks for msdt.exe in Windows\System32 and verifies if the mitigations are applied.
Note: Microsoft has not released any patch or KB numbers yet. Detection will be updated once advisory is updated.
An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user's rights.
Disabling MSDT URL protocol prevents troubleshooters being launched as links including links throughout the operating system.
Execute the command "reg delete HKEY_CLASSES_ROOT\ms-msdt /f" to disable the MSDT protocol.
Kindly refer to CVE-2022-30190 for workaround info
- CVE-2022-30190 -
msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190
CVEs related to QID 91909
| Advisory ID | Software | Component | Link |
|---|