Skip to main content

CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments

This seems to have been gaining traction with exploitations now being seen in the wild

’A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word.’

More here: https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/

6 comments

Chris.Childerhose
Forum|alt.badge.img+21

Yeah seems like a nasty one for Word.  Hopefully they patch it soon but I think there is a workaround via GPO.


Iams3le
Forum|alt.badge.img+11
  • Veeam Legend
  • 1374 comments
  • May 31, 2022

Great @dips  


marcofabbri
Forum|alt.badge.img+13
  • On the path to Greatness
  • 990 comments
  • June 1, 2022

How it’s exploited here, the big and awesome John Hammond

 


vNote42
Forum|alt.badge.img+13
  • On the path to Greatness
  • 1246 comments
  • June 1, 2022

Thanks for sharing, @dips !


Iams3le
Forum|alt.badge.img+11
  • Veeam Legend
  • 1374 comments
  • June 1, 2022
Chris.Childerhose wrote:

Yeah seems like a nasty one for Word.  Hopefully they patch it soon but I think there is a workaround via GPO.

Chris.Childerhose wrote:

Yeah seems like a nasty one for Word.  Hopefully they patch it soon but I think there is a workaround via GPO.

Yes, this is the right way to go about it right now. Individual registry tweak on a PC can help as well. I also think that antivirus providers are also very slow in providing rules that can block these exploits.


Iams3le
Forum|alt.badge.img+11
  • Veeam Legend
  • 1374 comments
  • June 1, 2022

The step by step workaround for the MSDT vulnerability can be found on this page: