Security News > 2022 > June > Microsoft patches actively exploited Follina Windows zero-day

Microsoft patches actively exploited Follina Windows zero-day
2022-06-14 18:00

Microsoft has released security updates with the June 2022 cumulative Windows Updates to address a critical Windows zero-day vulnerability known as Follina and actively exploited in ongoing attacks.

"Microsoft recommends installing the updates as soon as possible," the company further urged customers in a post on the Microsoft Security Response Center.

Tracked as CVE-2022-3019, the security flaw is described by Redmond as a Microsoft Windows Support Diagnostic Tool remote code execution bug that affects all Windows versions still receiving security updates.

While applying today's updates does not prevent Microsoft Office from automatically loading Windows protocol URI handlers without user interaction, it blocks PowerShell injection and disables this attack vector.

The Follina security vulnerability has been exploited in attacks for a while by state-backed and cybercrime threat actors with various end goals.

In light of Microsoft reporting active exploitation of the bug in the wild, CISA has also urged Windows admins and users to disable the MSDT protocol abused in these attacks.


News URL

https://www.bleepingcomputer.com/news/security/microsoft-patches-actively-exploited-follina-windows-zero-day/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2022-08-29 CVE-2022-3019 Authorization Bypass Through User-Controlled Key vulnerability in Tooljet
The forgot password token basically just makes us capable of taking over the account of whoever comment in an app that we can see (bruteforcing comment id's might also be an option but I wouldn't count on it, since it would take a long time to find a valid one).
network
low complexity
tooljet CWE-639
8.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Microsoft 365 49 1366 2822 162 4399