{"id":2515,"date":"2022-06-07T16:40:03","date_gmt":"2022-06-07T14:40:03","guid":{"rendered":"https:\/\/kalweit-its.de\/2022\/06\/follina-zero-day-vulnerability-cve-2022-30190\/"},"modified":"2022-10-20T17:57:32","modified_gmt":"2022-10-20T15:57:32","slug":"follina-zero-day-vulnerability-cve-2022-30190","status":"publish","type":"post","link":"https:\/\/kalweit-its.de\/en\/follina-zero-day-vulnerability-cve-2022-30190\/","title":{"rendered":"Follina Zero-Day Vulnerability (CVE-2022-30190)"},"content":{"rendered":"\n
\"\"<\/figure>\n\n

On 05\/27\/2022, security researchers from the group <\/mark>\n nao_sec<\/mark>\n<\/a> <\/mark>warned about a vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).<\/p>\n\n

The vulnerability, named “Follina”. \n CVE-2022-30190<\/mark>\n<\/a>, allows attackers to execute arbitrary Powershell commands and thus, for example, install ransomware or spy on data on target systems.<\/p>\n\n

The vulnerability thus poses a significant risk to the IT security of the entire organization, as systems controlled by an attacker can spread malware within the organization’s network, for example.<\/p>\n\n

The particular potential danger of the vulnerability lies in its relative simplicity. After downloading a suitably crafted Office document, loading the preview view in Windows Explorer activates the malicious code. Thus, the document does not need to be opened by the user, and the user interaction required to execute the malicious code is minimal. In security circles, the term “zero click exploit” is therefore used in connection with “Follina”.<\/p>\n\n

The exploit does not target the known vulnerable implementation of VBA macros, but the “ms-msdt” proto coll.<\/p>\n\n

This protocol is the basis for Windows-internal, automated error recovery and is therefore activated by default in all Microsoft Windows versions from Windows 7, as well as Windows Server versions from Windows Server 2008.<\/p>\n\n

Originally, it was assumed that “Follina” could only be exploited in connection with certain Microsoft Office versions. <\/p>\n\n

In recent days, however, there has been increasing evidence that the vulnerability can also be exploited independently of Microsoft Office applications.<\/p>\n\n

Building on the research of the exploit by security experts <\/mark>\n John Hammond<\/mark>\n<\/a> <\/mark>and \n @KevTheHermit<\/mark>\n<\/a>, security researchers at KALWEIT ITS were able to verify two MS Office-independent attack vectors.<\/p>\n\n

According to reports, current attack attempts nevertheless seem to rely primarily on manipulated Office documents as the primary mode of malicious code distribution.<\/p>\n\n

The Twitter account operated by the security company proofpoint reported that \n Threat Insight<\/mark>\n<\/a> <\/mark>on June 03, 2022, an email-based campaign targeting European and U.S. (local) governments. According to unconfirmed reports, attacks on Ukrainian authorities, as well as a campaign in the Oceanic region, also took place.<\/p>\n\n

On 31.05.2022, the BSI responded with a \n Notification of the second highest warning level<\/mark>\n<\/a> “3 \/ Orange” (“The IT threat situation is business-critical. Massive impairment of regular operations.”) to the incidents.<\/p>\n\n

In Microsoft’s “Security Response Center” (MSRC) the \n Severity of the vulnerability<\/mark>\n<\/a>) is rated 7.8 out of 10. Microsoft also states that it is working on a security update.<\/p>\n\n

As long as this has not yet appeared, the BSI and Microsoft both recommend disabling the MSDT URL protocol handler using registry keys:<\/p>\n\n

This succeeds as follows:<\/p>\n\n