Skip to main content

CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability

  • May 31, 2022
  • 6 comments
  • 257 views

dips
Forum|alt.badge.img+7
  • On the path to Greatness

This seems to have been gaining traction with exploitations now being seen in the wild

’A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word.’

More here: https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/

6 comments

Chris.Childerhose
Forum|alt.badge.img+21

Yeah seems like a nasty one for Word.  Hopefully they patch it soon but I think there is a workaround via GPO.


Iams3le
Forum|alt.badge.img+11
  • Veeam Legend
  • May 31, 2022

Great @dips  


marcofabbri
Forum|alt.badge.img+12
  • On the path to Greatness
  • June 1, 2022

How it’s exploited here, the big and awesome John Hammond

 


vNote42
Forum|alt.badge.img+12
  • On the path to Greatness
  • June 1, 2022

Thanks for sharing, @dips !


Iams3le
Forum|alt.badge.img+11
  • Veeam Legend
  • June 1, 2022

Yeah seems like a nasty one for Word.  Hopefully they patch it soon but I think there is a workaround via GPO.

Yeah seems like a nasty one for Word.  Hopefully they patch it soon but I think there is a workaround via GPO.

Yes, this is the right way to go about it right now. Individual registry tweak on a PC can help as well. I also think that antivirus providers are also very slow in providing rules that can block these exploits.


Iams3le
Forum|alt.badge.img+11
  • Veeam Legend
  • June 1, 2022

The step by step workaround for the MSDT vulnerability can be found on this page: 

  •