Stay Tuned!

Subscribe to our newsletter to get our newest articles instantly!

Security

How to Solve Microsoft Support Diagnostic Tool Vulnerability

Background

We have been following one of YouTube’s IT security channels, and they mentioned Zero Day in relation to Microsoft Office (Follina). After researching this, we found that the vulnerability is actually related to Microsoft Support Diagnostic Tool. The detail of the attack is mentioned on this – https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e

Temporary Solution

According to Microsoft Blog, there is no solution as yet only a workaround – https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/

Microsoft Security Response Centre website

The solution is to block the MSDT protocol to launch the troubleshooter.

To test this, we open a browser and type in:

ms-msdt://

If it launched a pop-up, it means that the hacker/attacker can exploit this.

To disable this, we run a Command Prompt as Administrator.

To back up the registry to C: root drive, we run the command:

reg export HKEY_CLASSES_ROOT\ms-msdt C:\msdt_regkey_backup.reg

To delete the registry, we run the command:

reg delete HKEY_CLASSES_ROOT\ms-msdt /f

At this point, it’s protected until the patch comes in.

To restore the registry, we run the command:

reg import C:\msdt_regkey_backup.reg

The other suggestion will be upon checking the endpoint security provider.

Also, keep checking the update from the Microsoft Security Response Centre.

The End

Congratulation on reaching the end of this article. We hope that we have been able to shed some light on outlining what you need to know to solve the Microsoft Support Diagnostic Tool Vulnerability.

We write this in such a way that this is not a fixed article. Like in this journey, We learn as we go and we re-write some parts of the article so please keep pinging with this article or any general tech posts.

We also would love to hear about how you deal with the situation and what IT-related challenges you might be facing. Please feel free to leave us a comment below this article or you can contact us on the Dewacorp website for your IT support, application integration, application development, or other IT-related. Alternatively, you can casually have a chat on Dewachat. Let us know if you have any questions that we can help with!

Big thank you for the photo by Kevin Paster from Pexels.

If you want to boost your product and service to the wider web community, you can visit our Dewalist classified website – home to 15,000+ active users and 25,000+ active advertising so far. Check it out!

If you love this security article or any security posts and you would like to receive an update of this article or our latest post, please sign up for the form below:

Newsletter signup

This is a newsletter for tech, creative, gadgets, games and crypto.

Please wait...

Thank you for sign up!

Avatar

Valdy

About Author

Valdy founded Dewacorp.com, a helpdesk and IT Services provider that has taken care of over 39,000 customer service requests in the past 15 years - that's nearly 2,600 per year. He also created the growing Dewalist.com - a classified website that has close to 55,000 page views and 6,000 user visits per month with 52,000 yearly published ads and 39,000 active registered users. He blogs for the ever-growing Dewapost.com, a tech blog that gets around 20,000 impressions per month with 700 clicks and 10 average pages first impressions on Google Search. You can reach him on the Contact Us page, social media links below or Dewachat.com.

You may also like

Feature Security

How to Harden the Ubuntu Server in 2022

Background As we started using more cloud-based applications for the hosting of our website and applications, we compiled a blog
Security

How to Harden Router Security for Home/Office in 2022

Background As configured more routers on-site either in the office or home-office environment, we started to compile on how to