Beyond the Radar: Join GigaOm and Cynet May 6th
Why Cynet
Our Valued Partners
Industry Validation
Platform
Solutions
Prevent, detect, and remediate threats automatically.
Detect and isolate suspicious traffic instantly.
Identify misconfigurations and risks before attackers do.
Block phishing and malicious attachments.
Extend protection to every device.
Stop credential theft and lateral movement.
Pre-built playbooks and automated workflows that reduce manual effort.
Partners
Resources
Resource Center
Company
Why Cynet
Our Valued Partners
Industry Validation
Platform
Solutions
Prevent, detect, and remediate threats automatically.
Detect and isolate suspicious traffic instantly.
Identify misconfigurations and risks before attackers do.
Block phishing and malicious attachments.
Extend protection to every device.
Stop credential theft and lateral movement.
Pre-built playbooks and automated workflows that reduce manual effort.
Partners
Resources
Resource Center
Company
Subscribe to get the latest updates and resources
By: Daniel Lippa – CyOps analyst
Disclosed on May 30th, CVE-2022-30190 is an abuse of Microsoft Office, allowing threat actors to launch the ‘ms-msdt’ URI protocol handler to execute commands such as PowerShell and CMD simply by opening the initiated Microsoft Office applications such as “.doc” or “.rtf” to initiate a remote command execution on an environment.
Cynet 360 AutoXDR™ detection and prevention mechanisms are already updated with rules and policies to make sure our customers are protected from attempts to exploit this vulnerability.
Alert from Cynet 360 AutoXDR user interface
The Microsoft Windows Support Diagnostic Tool (MSDT) is an application of Microsoft Windows operating system.
The msdt.exe is an executable file developed as part of Microsoft’s Windows Operating System and belongs to the Diagnostics Troubleshooting Wizard process.
The attack is carried out quite easily. Requiring minimal interaction with the user, any executable or command execution can be triggered by simply opening the .doc/.rtf file without additional prerequisites.
If the malicious document is a “.doc” file, the user needs to click on it for execution. If the malicious document is a “.rtf” file, hovering over it for a preview is enough for execution.
Also, it’s easy to launch a malicious PowerShell command with -style “hidden” flag without exposing the user to the fact that a malicious payload was executed on their system, since the “ms-msdt” can run commands automatically without user interaction.
The MSDT Remote Code Execution (Follina) vulnerability currently affects Microsoft Office 2013, 2016, 2019, and 2021, which has no official patch available.
Since Cynet’s platform constantly monitors the memory address environment, Cynet 360 AutoXDR has many detection mechanisms related to parent processing and malicious script commands. Once Cynet detects that Microsoft Office is trying to initiate code execution through a third-party application, it will automatically detect and prevent the activity.
Also, since Microsoft Office utilities are not supposed to open the Diagnostic tool, which is meant for other processes, we have deployed a detection rule that will be triggered once Cynet detects that the diagnostic tool has a process appearance from the Office-related file.
This rule will also prevent the activity by killing the process immediately, blocking threat actors on the spot since they must have the process up and running to initiate code execution.
Exploitation attempt blocked on a host protected by Cynet 360 AutoXDR
You can always simply uninstall the Windows Diagnostic tool by following these steps:
Disabling MSDT URL protocol prohibits troubleshooters from being launched as links, including links within the operating system itself. These troubleshooters can still be accessed through the Get Help application and the system settings as supplementary or alternative troubleshooters.
Follow these steps to disable the MSDT URL protocol:
Cynet’s MDR team, CyOps, monitors our customers’ environments 24/7 and will contact you in cases where indicators of this vulnerability are detected in your environment.
The team is available to our customers for any issues, questions, and there to provide additional information around the clock.
Have questions about this vulnerability?
You can contact our CyOps team directly at:
CyOps Mailbox – soc@cynet.com
Israel: +972 72-3369736
UK: +44 2032 909051
US : +1 (347) 474-0048
Search results for: