Vulnerabilities > CVE-2022-30190 - Unspecified vulnerability in Microsoft products
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.
Vulnerable Configurations
Related news
- Yet another zero-day (sort of) in Windows “search URL” handling (source)
- Follina abuses Microsoft Office to execute remote code (source)
- Attackers are leveraging Follina. What can you do? (source)
- State-Backed Hackers Exploit Microsoft 'Follina' Bug to Target Entities in Europe and U.S (source)
- Windows zero-day exploited in US local govt phishing attacks (source)
- Qbot – known channel for ransomware – delivered via phishing and Follina exploit (source)
- Researchers Warn of Unpatched "DogWalk" Microsoft Windows Vulnerability (source)
- Now Windows Follina zero-day exploited to infect PCs with Qbot (source)
- June 2022 Patch Tuesday forecast: Internet Explorer fades into the sunset (source)
- Russian hackers start targeting Ukraine with Follina exploits (source)
- You’re invited! Join us for a live walkthrough of the “Follina” story… (source)
- Microsoft June 2022 Patch Tuesday fixes 1 zero-day, 55 flaws (source)
- Follina gets fixed – but it’s not listed in the Patch Tuesday patches! (source)
- Microsoft fixes under-attack Windows zero-day Follina (source)
- Patch Tuesday: Microsoft Issues Fix for Actively Exploited 'Follina' Vulnerability (source)
- Russian govt hackers hit Ukraine with Cobalt Strike, CredoMap malware (source)
- XFiles info-stealing malware adds support for Follina delivery (source)