• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Microsoft • News • Windows Update  /  Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT
Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT
03 June 2022

Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

Written by Seqrite
Seqrite
Cybersecurity, Microsoft, News, Windows Update

A Zero-day Remote Code Execution Vulnerability with high severity has been identified as CVE-2022-30190 “FOLLINA” in Microsoft Windows Support Diagnostic Tool (MSDT).

MSDT is a tool present on Windows version 7 and above and is used for the diagnosis of problems in applications such as Ms. Office Documents when any user reports a problem to Microsoft support.

Why is CVE-2022-30190 “Follina” vulnerability so dangerous?

This diagnostic tool (MSDT) is usually called by applications such as Ms. Office Documents which allows remote code execution with the privileges of the calling process when called via MSDT URL Protocol. An attacker can exploit this vulnerability to run any arbitrary code.

This vulnerability has been exploited in wild with the use of Ms Office Documents distributed via email to execute malicious payloads (For ex: Turian Backdoor, Cobalt Strike, etc.). Initially, a doc sample named VIP Invitation to Doha Expo 2023.docx (7c4ee39de1b67937a26c9bc1a7e5128b) used Webdav to download CobaltStrike.

Chinese APT group ‘TA413’ have exploited this Vulnerability in the wild which downloads a backdoor as a payload via MSDT URL Protocol.

Below figure shows the base64 encoded html file downloaded by DOC(SHA: 000c10fef5a643bd96da7cf3155e6a38) from hxxp://212[.]138.130.8/analysis [.]html

base64 encoded html file

Following figure shows the decoded data:

When we decoded base64 encoded data it can be clearly seen that svchosts.exe which is the backdoor is downloaded via MSDT URL PROTOCOL

Mitigation of “Follina”

 Disabling MSDT URL protocol:

  1. Execute the following command as Administrator to back up the registry key –

“reg export HKEY_CLASSES_ROOT\ms-msdt filename“

  1. To delete the registry key, execute the command “reg delete HKEY_CLASSES_ROOT\ms-msdt /f”.

For restoring the registry key execute the following command as Administrator – “reg import filename”

How does Seqrite protect its customers from CVE-2022-30190 – Follina?

Seqrite protects its customers against this vulnerability in MSDT via following detections: –

  • Backdoor.Turian.S28183972
  • CVE-2022-30190.46635
  • CVE-2022-30190.46634
  • CVE-2022-30190.46624
  • CVE-2022-30190.46623

 Previous PostUpdate security certificate to install Seqrite product successful...
Next Post  CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT expl...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies