{"id":24714,"date":"2022-06-01T23:52:54","date_gmt":"2022-06-01T21:52:54","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=24714"},"modified":"2022-06-02T11:45:55","modified_gmt":"2022-06-02T09:45:55","slug":"follina-schwachstelle-cve-2022-30190-warnungen-erste-angriffe-der-status","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/06\/01\/follina-schwachstelle-cve-2022-30190-warnungen-erste-angriffe-der-status\/","title":{"rendered":"Follina vulnerabilitiy (CVE-2022-30190): Status, Findings, Warnings &amp; Attacks"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/06\/01\/follina-schwachstelle-cve-2022-30190-warnungen-erste-angriffe-der-status\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Since the weekend, a new Windows vulnerability CVE-2022-30190 in combination with Microsoft Office has been knows under the name Follina. In the meantime, the US CISA and also the BSI have warned about this vulnerability &#8211; while security researchers have observed the first attacks via this 0-day vulnerability by Chinese APTs. Meanwhile, it is also clear that this attack works without Microsoft Office. The CVE-2022-30190 vulnerabilities could become the next big thing in security if anti-virus solutions also detect infected documents. Here's an overview of the latest findings.<\/p>\n<p><!--more--><\/p>\n<h2>Vulnerability CVE-2022-30190<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/7d80b1d0859a4fb3a86a3c493c9fe45a\" alt=\"\" width=\"1\" height=\"1\" \/>Vulnerability CVE-2022-30190 allows the Microsoft Support Diagnostics Utility to be abused via the <em>ms-msdt:<\/em> protocol to download malicious Word documents (or Excel spreadsheets) from the Web. I had mentioned this issue in the blog post <a href=\"https:\/\/borncity.com\/win\/2022\/06\/01\/follina-attack-via-word-documents-and-ms-msdt-protocol-cve-2022-30190\/\">Follina: Attack via Word documents and ms-msdt protocol (CVE-2022-30190)<\/a>. The following tweet shows an overview of which Office versions are allegedly vulnerable and which are not &#8211; where the statements (e.g. about Office 2021) contradict the statements of security researcher Kevin Beaumont, which I quote in my article above. I assume that in case of doubt all Office versions are vulnerable.<\/p>\n<p><a href=\"https:\/\/twitter.com\/yamatosecurity\/status\/1531467838820855809\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Follina\" src=\"https:\/\/i.imgur.com\/Rc7mtjm.png\" alt=\"Follina\" \/><\/a><\/p>\n<p>Microsoft has since released a support document <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/\">Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability<\/a> for CVE-2022-30190. There is also some discussion there with regard to mitigating the vulnerability. In addition, Microsoft Defender build 1.367.719.0 or later detects such attacks via its signature files.<\/p>\n<h2>The vulnerability is being exploited<\/h2>\n<p>Microsoft has warned in an emailed security advisory about <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-30190\" target=\"_blank\" rel=\"noopener\">CVE-2022-30190<\/a> and wrote, hat the vulnerability is already being exploited. Arstechnica points out in <a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/05\/code-execution-0day-in-windows-has-been-under-active-exploit-for-7-weeks\/\" target=\"_blank\" rel=\"noopener\">this article<\/a> that this vulnerability has been exploited for seven weeks, as discovered by Shadow Chaser security researcher.<\/p>\n<p><a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1531693331578863616\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\" CVE-2022-30190 exploited by Chinese APT\" src=\"https:\/\/i.imgur.com\/N53f7sk.png\" alt=\" CVE-2022-30190 exploited by Chinese APT\" \/><\/a><\/p>\n<p>Security researcher Kevin Beaumont points out in the above <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1531693331578863616\" target=\"_blank\" rel=\"noopener\">tweet<\/a> a report from Proofpoint that Chinese APTs are already actively exploiting the CVE-2022-30190 vulnerability. The attackers are impersonating the Central Tibetan Administration's \"Women Empowerments Desk\" in attack campaigns and using the domain <em>tibet-gov.web[.]app.<\/em> URLs are used to attempt to download a Word document packed into a ZIP archive. The document exploits the Folloinia vulnerability. Beaumont has since amended his post <a href=\"https:\/\/doublepulsar.com\/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e\" target=\"_blank\" rel=\"noopener\">Follina \u2014 a Microsoft Office code execution vulnerability<\/a> dated May 29, 2022 accordingly.<\/p>\n<p>Security researcher Will Dormann has once again analyzed the exploitation of the vulnerability in a <a href=\"https:\/\/twitter.com\/wdormann\/status\/1531250993127739392\" target=\"_blank\" rel=\"noopener\">series of tweets<\/a> and writes that the pattern is similar to the MSHTML vulnerability CVE-2021-40444 discovered months ago. In the following <a href=\"https:\/\/twitter.com\/wdormann\/status\/1531619222295568384\" target=\"_blank\" rel=\"noopener\">tweet<\/a>, he states that a redirect to an exploit can be forced using wget via PowerShell &#8211; no Office is required.<\/p>\n<p><a href=\"https:\/\/twitter.com\/wdormann\/status\/1531619222295568384\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"wget &amp; Powershell to abouse CVE-2021-40444\" src=\"https:\/\/i.imgur.com\/rqLxWFg.png\" alt=\"wget &amp; Powershell to abouse CVE-2021-40444\" \/><\/a><\/p>\n<h2>US-CERT warns<\/h2>\n<p>US-CERT, a U.S. security agency warns about the vulnerability according to the following <a href=\"https:\/\/twitter.com\/USCERT_gov\/status\/1531713602050486272\" target=\"_blank\" rel=\"noopener\">tweet<\/a> linking to <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/05\/31\/microsoft-releases-workaround-guidance-msdt-follina-vulnerability\" target=\"_blank\" rel=\"noopener\">this document<\/a> and recommends administrators to refer to the Microsoft support document Guidance <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/\">Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/USCERT_gov\/status\/1531713602050486272\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"US-CERT CVE-2022-30190\" src=\"https:\/\/i.imgur.com\/pYwTyL2.png\" alt=\"US-CERT CVE-2022-30190\" \/><\/a><\/p>\n<p>According to the Common Vulnerability Scoring System (CVSS), the severity of the vulnerabilities is rated at 7.8 (CVSSv3.1). Frank Carius also points to <a href=\"https:\/\/www.nospamproxy.de\/de\/neue-zero-day-luecke-so-koennen-sie-sich-vor-follina-schuetzen\/\" target=\"_blank\" rel=\"noopener\">this German post<\/a> from nospamproxy.de via <a href=\"https:\/\/twitter.com\/msxfaq\/status\/1531725975289049089\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>, which explains how to protect yourself from Follina via the Nospam proxy.<\/p>\n<p><strong>Addendum:<\/strong> A YouTube video with a demo of the PoC may be found <a href=\"https:\/\/www.youtube.com\/watch?v=JPjhc9V0z58\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Since the weekend, a new Windows vulnerability CVE-2022-30190 in combination with Microsoft Office has been knows under the name Follina. In the meantime, the US CISA and also the BSI have warned about this vulnerability &#8211; while security researchers have &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/06\/01\/follina-schwachstelle-cve-2022-30190-warnungen-erste-angriffe-der-status\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,580,2],"tags":[125,69,194],"class_list":["post-24714","post","type-post","status-publish","format-standard","hentry","category-office","category-security","category-windows","tag-office","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=24714"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24714\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=24714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=24714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=24714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}