Microsoft MSDT Follina Vulnerability
A 0-day Windows MSDT Vulnerability
A vulnerability on Microsoft Support Diagnostic Tool (MSDT) in Microsoft Windows has been spotted in the wild that allows remote code execution. Learn More »
Common Vulnerabilities and Exposures
Background
A cybersecurity researcher from nao_sec spotted a vulnerability on a Microsoft Word document uploaded in VirusTotal. The document abuses the MSDT URI scheme to download and run malicious payload. The document references "0438" which is an area code for Follina municipality in Italy.
Threat Radar Overall Score: 3.8
CVSS Rating | 7.0 | |
FortiRecon Score | 95/100 | |
Known Exploited | Yes | |
Exploit Prediction Score | 97.14% | |
FortiGuard Telemetry | 16 |
Latest Development
Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.
May 30, 2022: Microsoft released a security update at
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190
May 30, 2022: Microsoft posted a guidance at
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190
May 30, 2022: The Hacker News published an article at
https://thehackernews.com/2022/05/watch-out-researchers-spot-new.html
FortiGuard Cybersecurity Framework
Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.
-
AV
-
AV (Pre-filter)
-
IPS
-
Outbreak Detection
-
Threat Hunting
-
Content Update
-
Assisted Response Services
-
Automated Response
-
NOC/SOC Training
-
End-User Training
-
Attack Surface Hardening
AV Blocks malware exploiting the MSDT RCE vulnerability (CVE-2022-30190).
AV (Pre-filter) Blocks malware exploiting the MSDT RCE vulnerability (CVE-2022-30190).
IPS Blocks attack attempts related to MSDT RCE vulnerability (CVE-2022-30190).
Outbreak Detection
Threat Hunting
Content Update
Assisted Response Services Experts to assist you with analysis, containment and response activities.
Automated Response Services that can automaticlly respond to this outbreak.
NOC/SOC Training Train your network and security professionals and optimize your incident response to stay on top of the cyberattacks.
End-User Training Raise security awareness to your employees that are continuously being targetted by phishing, drive-by download and other forms of cyberattacks.
Attack Surface Hardening Check Security Fabric devices to build actionable configuration recommendations and key indicators.
Threat Intelligence
Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.
Loading ...
Indicators of compromise
IOC Indicator List
Indicators of compromise
IOC Threat Activity
Last 30 days
Chg
Avg 0
Mitre Matrix
Click here for the ATT&CK Matrix
References
Sources of information in support and relation to this Outbreak and vendor.