CVE-2022-30190

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution when Microsoft Support Diagnostic Tool (MSDT) is invoked via URL protocol from applications like Microsoft Word. Attackers can execute arbitrary code with the privileges of the calling application, potentially leading to full system compromise. Affected users include anyone running vulnerable versions of Microsoft Office on Windows systems.

💻 Affected Systems

Products:
  • Microsoft Office
  • Microsoft Word
  • Microsoft Outlook
Versions: Multiple versions including Office 2013, 2016, 2019, 2021, and Office 365
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction (opening malicious document) but exploitation is straightforward once triggered.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover where attacker gains administrative privileges, installs persistent malware, exfiltrates sensitive data, and creates backdoors for future access.

🟠

Likely Case

Attacker executes malicious payload with user privileges, leading to data theft, ransomware deployment, or lateral movement within the network.

🟢

If Mitigated

Limited impact with proper application control policies, network segmentation, and user privilege restrictions preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploits in the wild since June 2022, requires user to open malicious Office document but no further authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: June 2022 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190

Restart Required: Yes

Instructions:

1. Apply Microsoft's June 2022 security updates via Windows Update. 2. For Office 365, ensure automatic updates are enabled. 3. For enterprise deployments, deploy patches through WSUS or SCCM.

🔧 Temporary Workarounds

Disable MSDT URL Protocol

windows

Prevents MSDT from being invoked via URL protocol, blocking the exploitation vector

reg add "HKCU\Software\Classes\ms-msdt" /v "URL Protocol" /d "" /f

Block Office from spawning child processes

windows

Prevents Office applications from launching child processes via Attack Surface Reduction rule

Add-MpPreference -AttackSurfaceReductionRules_Ids d4f940ab-401b-4efc-aadc-ad5f3c50688a -AttackSurfaceReductionRules_Actions Enabled

🧯 If You Can't Patch

  • Implement application control policies to block MSDT execution
  • Use network segmentation to isolate Office systems and restrict internet access

🔍 How to Verify

Check if Vulnerable:

Check if MSDT URL protocol handler exists in registry: reg query "HKCU\Software\Classes\ms-msdt"

Check Version:

wmic product get name,version | findstr "Office"

Verify Fix Applied:

Verify June 2022 security updates are installed via: wmic qfe list | findstr "KB5014692 KB5014699"

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing msdt.exe spawned from Office processes
  • Process creation events for msdt.exe with suspicious command-line arguments

Network Indicators:

  • Outbound connections from msdt.exe to external IPs
  • HTTP requests with ms-msdt:// protocol in web logs

SIEM Query:

Process Creation where (Image contains "msdt.exe" AND ParentImage contains "WINWORD.EXE") OR (CommandLine contains "ms-msdt" AND ParentImage contains "WINWORD.EXE")

🔗 References

📤 Share & Export