{"id":802567,"date":"2022-06-09T14:56:29","date_gmt":"2022-06-09T14:56:29","guid":{"rendered":"https:\/\/usesecurevpn.com\/?p=802567"},"modified":"2022-06-10T01:10:25","modified_gmt":"2022-06-10T01:10:25","slug":"exploitation-of-follina-zero-day-vulnerability","status":"publish","type":"post","link":"https:\/\/usesecurevpn.com\/es\/exploitation-of-follina-zero-day-vulnerability\/","title":{"rendered":"Exploitation of Follina Zero-Day Vulnerability"},"content":{"rendered":"\n[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.16.1&#8243; _module_preset=\u00bbdefault\u00bb da_disable_devices=\u00bboff|off|off\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb da_is_popup=\u00bboff\u00bb da_exit_intent=\u00bboff\u00bb da_has_close=\u00bbon\u00bb da_alt_close=\u00bboff\u00bb da_dark_close=\u00bboff\u00bb da_not_modal=\u00bbon\u00bb da_is_singular=\u00bboff\u00bb da_with_loader=\u00bboff\u00bb da_has_shadow=\u00bbon\u00bb][et_pb_row _builder_version=\u00bb4.16.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb text_text_color=\u00bb#3c73a3&#8243; hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<p>Security researchers warned of exploitation noticed in the network, which Microsoft confirmed. So it looks like Windows and Office are affected by a zero-day vulnerability.<\/p>[\/et_pb_text][et_pb_divider _builder_version=\u00bb4.16.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<p>Windows has a security hole. It&#8217;s tracked as CVE-2022-30190. \u00abnao-sec\u00bb reported a malicious Word file that anybody can use to execute arbitrary PowerShell code. It looks like Belarus is a source of this file because it was uploaded to VirusTotal from that country.<\/p>\n<p>One of the first who analyzed the exploit was researcher Kevin Beaumont. He named it \u00abFollina\u00bb because the malicious file references 0438, the area code for the Italian village of Follina.<\/p>\n<p>Unfortunately, Microsoft has known about the vulnerability since April. \u00abCrazymanArmy\u00bb of the Shadow Chaser Group, a research team focusing on APT hunting and analysis, notified Microsoft about this vulnerability.<br \/>Moreover, Microsoft initially classified it as \u00abnot a security-related issue\u00bb.<\/p>\n<p><strong>According to Microsoft, the \u00abissue has been fixed,\u00bb but a patch does not appear to be available.<\/strong><\/p>[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/usesecurevpn.com\/wp-content\/uploads\/2022\/06\/Take-control-of-your-online-security-horizontal.png\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb theme_builder_area=\u00bbpost_content\u00bb alt=\u00bbTake control of your online security\u00bb title_text=\u00bbTake control of your online security\u00bb url=\u00bbhttps:\/\/www.xvuslink.com\/?a_fid=evpnicz&#038;offer=3monthsfree&#038;data1=Follina\u00bb url_new_window=\u00bbon\u00bb hover_enabled=\u00bb0&#8243; sticky_enabled=\u00bb0&#8243; align=\u00bbcenter\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<p>Even though initially this was described as a Microsoft Office zero-day vulnerability, Microsoft clarified that Follina affects the Microsoft Support Diagnostic Tool (MSDT). MSDT collects user\/device information and sends it to Microsoft support.<\/p>\n<p>Cybercriminals could use this vulnerability to run a code, install\/change\/delete data, or modify accounts.<\/p>\n<p>According to Microsoft (advisory for CVE-2022-30190):<\/p>\n<blockquote>\n<p>A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user&#8217;s rights,<\/p>\n<\/blockquote>\n<p>In the past, most exploits used macros to execute some code. Currently, it&#8217;s even worse because <strong>this attack does not use macros<\/strong>. Therefore, regardless macros are enabled or not, the malicious code can be executed.<\/p>\n<p>Everything gets even more interesting because Beaumont noticed <strong>an invitation to an interview with Sputnik Radio<\/strong> that is supposed to work as bait and <strong>target Russian users<\/strong>.<\/p>\n<p>Researchers have confirmed that exploitation works against multiple versions of Microsoft Office:<\/p>\n<ul>\n<li>Office Pro Plus, <\/li>\n<li>Office 2013, <\/li>\n<li>Office 2016, <\/li>\n<li>Office 2019 <\/li>\n<li>Office 2021.<\/li>\n<\/ul>\n<p>What is more, Microsoft informed that this vulnerability affects Windows Operating Systems:<\/p>\n<ul>\n<li>Windows 7, <\/li>\n<li>Windows 8.1, <\/li>\n<li>Windows 10, <\/li>\n<li>Windows 11, <\/li>\n<li>Windows Server 2008, <\/li>\n<li>Windows Server 2012, <\/li>\n<li>Windows Server 2016, <\/li>\n<li>Windows Server 2019, <\/li>\n<li>Windows Server 2022.<\/li>\n<\/ul>\n<p>Nonetheless, if you update your system regularly, you should be safe. New Defender updates should detect and block files associated with this vulnerability. Still, to be safe, it&#8217;s good to check Microsoft&#8217;s guidance regarding this remote code execution vulnerability, including workarounds &#8211; <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/\" target=\"_blank\" rel=\"noopener\" title=\"Microsoft guidance on protecting from the vulnerability\">Microsoft guidance<\/a><\/p>\n<p>Various cybersecurity firms have published an analysis of the exploit:<\/p>\n<ul>\n<li>Huntress, <\/li>\n<li>Malwarebytes, <\/li>\n<li>Sophos,<\/li>\n<li>&#8230;<\/li>\n<\/ul>\n<p>It&#8217;s also possible to find online proof-of-concept (PoC) exploits.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Exploitation of Follina Zero-Day Vulnerability confirmed by Microsoft. Security researchers warned of exploitation in April. Windows and Office are affected.<\/p>\n","protected":false},"author":1,"featured_media":802570,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","_aioseo_description":null,"footnotes":""},"categories":[64],"tags":[73,74,75],"class_list":["post-802567","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-exploitation","tag-follina","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/posts\/802567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/comments?post=802567"}],"version-history":[{"count":0,"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/posts\/802567\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/media\/802570"}],"wp:attachment":[{"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/media?parent=802567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/categories?post=802567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/usesecurevpn.com\/es\/wp-json\/wp\/v2\/tags?post=802567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}