BSI: Follina vulnerability with increased warning level

BSI: Follina vulnerability with increased warning level

Share post

Weeks ago, the new Follina zero-day bug caused a stir in remote code execution in Microsoft Office. More specifically, it is a security vulnerability in Microsoft's Support Diagnostic Tool (MSDT). The BSI has now declared the orange warning level (max. red) for Follina. The CVSS (Common Vulnerability Scoring System) score is now rated “High” 7,8 out of 10.

Microsoft already published details and mitigation measures for a vulnerability in Microsoft's Support Diagnostic Tool (MSDT) via the Microsoft Security Response Center on May 30.05.2022, 2022. The vulnerability has been assigned the Common Vulnerabilities and Exposures (CVE) number CVE-30190-7.8. According to the Common Vulnerability Scoring System (CVSS), the severity of the vulnerabilities is classified as 3.1 (CVSSvXNUMX).

Warning level increases from “Yellow” to “Orange”

The vulnerability can be exploited using a specially crafted Word file, which may enable attackers to initiate the download of an HTML file from the Internet based on the remote template function contained in the document processing program. This can
be misused to further execute PowerShell code, allowing attackers to install programs, view, modify, or delete data. The findings of the security researchers from nao_sec, who discovered an uploaded and prepared Word file at VirusTotal, now underline that the vulnerability is being actively exploited.

What can you do?

Microsoft has already released an official workaround and will hopefully release a permanent patch soon. As handy as Microsoft's proprietary ms-xxxx URLs are, the fact that they are designed to automatically start processes when certain file types are opened or even just previewed is clearly a security risk.

Also, a commonly accepted troubleshooting technique in the community is to simply break the relationship between ms-msdt:URLs and the MSDT.EXE utility. A further description of the vulnerability can be found in a first news from Sophos.

More at BSI.bund.de

 


About the Federal Office for Information Security (BSI)

The Federal Office for Information Security (BSI) is the federal cyber security authority and the creator of secure digitization in Germany. The guiding principle: As the federal cyber security authority, the BSI designs information security in digitization through prevention, detection and reaction for the state, economy and society.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more