Chủ Nhật, Tháng Hai 5, 2023
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
No Result
View All Result
Home Tech

Microsoft Releases Alternatives to Office Vulnerability in Active Exploit

31 Tháng Năm, 2022
in Tech
0
Microsoft Releases Alternatives to Office Vulnerability in Active Exploit
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

Các bài viết liên quan:

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022

On Monday, Microsoft published guidance on a newly discovered zero-day security vulnerability in the Office productivity suite that can be exploited to execute code on affected systems.

The vulnerability, currently assigned the identifier CVE-2022-30190, is rated 7.8 out of 10 in severity on the CVSS vulnerability scoring system. Microsoft Office 2013, Office 2016, Office 2019, and Office 2021 versions as well as Professional Plus versions are affected.

“To help protect customers, we’ve published CVE-2022-30190 and additional guidance here,” a Microsoft spokesperson told The Hacker News in an emailed statement.

The Follina vulnerability, which emerged late last week, involves a real-world exploit that takes advantage of a flaw in a weaponized Word document to execute code PowerShell arbitrary using the “ms-msdt:” URI scheme. The sample was uploaded to VirusTotal from Belarus.

But the first signs of exploiting this vulnerability date back to April 12, 2022, when a second sample was uploaded to the database. malware. This artifact is said to have targeted a user in Russia with a malicious Word document (“приглашение на интервью.doc”) masquerading as an interview invitation to Radio Sputnik.

“A remote code execution vulnerability exists when MSDT is invoked using the URL protocol from a calling application such as Word,” Microsoft said in an advisory to CVE-2022-30190.

“An attacker who successfully exploited this vulnerability could run arbitrary code with calling application privileges. An attacker can then install programs, view, change or delete data, or create new accounts in the context of the user’s permissions.”

The tech giant credited the madman, a member of the Shadow Chaser Group, for reporting the vulnerability on April 12, coinciding with the discovery of a wild exploit targeting Russian users, showing The company was aware of the vulnerability.

Indeed, according to the screenshot shared by the researcher on Twitter, Microsoft closed the report on April 21, 2022 stating “the issue has been fixed”, while dismissing the vulnerability as “nothing”. not a security issue” as it requires a confirmation code provided by tech support when starting the diagnostic tool.

Besides releasing detection rules for Microsoft Defender for Endpoints, the Redmond-based company has included workarounds in a guide to disable the MSDT URL protocol through modifying the Windows Registry.

“If the calling application is a Microsoft Office application, by default Microsoft Office opens documents from the internet in Protected View or Protected Application for Office, both of which prevent the current attack” , Microsoft said.

This is not the first time that Microsoft Office protocol schemes like “ms-msdt:” have been included in the scanner because of the potential for abuse. Earlier this January, German security company SySS revealed how it was possible to open files directly through specially designed URLs like “ms-excel: ofv | u | https:///192.168.1.10/poc[.]xls. “

.

Previous Post

Download Office Tool 2022 – Comprehensive toolkit for Microsoft Office

Next Post

The Best Apps Every Student Should Use

Megusta

Megusta

Related Posts

5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
Instruction how to use OBS streaming software

Features, settings and how to use OBS streaming software through 9 simple steps

25 Tháng Mười Hai, 2022
What is Trans woman?  What is Transgender Women?

What is Trans woman? What is Transgender Women?

23 Tháng Mười Hai, 2022
Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

22 Tháng Mười Hai, 2022
How to get 50 free coins of SkyJoy App to redeem

How to get 50 free coins of SkyJoy App to redeem

21 Tháng Mười Hai, 2022
Load More
Next Post
The Best Apps Every Student Should Use

The Best Apps Every Student Should Use

Trả lời Hủy

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Bài viết mới

How to get travel insurance
Đời sống

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly
Phần mềm

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games
Software

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power
Software

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 
Tech

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software
Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022
W3Schools

Ads

Contact: [email protected]

DMCA.com Protection Status

Categories

  • Android
  • Cạm bẫy tâm lí
  • Chưa được phân loại
  • Đồ họa
  • Đời sống
  • Gen Z
  • Health
  • iOS
  • Kĩ năng mềm
  • News
  • Nhà mạng
  • Phần mềm
  • Phần mềm đồ họa
  • Review sách
  • Software
  • Tech
  • Thiết kế ảnh
  • Thiết kế video
  • Thủ thuật
  • Travel
  • Văn hóa Nam Bộ
  • Văn học
  • Window

Browse by Tag

ai là triệu phú android Apple browser Bullet Journal bản thân chai pin Chỉnh ảnh data domain download fshare game game show giả lập màu hosting IKEA ios khuyến mãi kinh doanh kiến thức kiểm tra pin messenger miễn phí mua sắm Máy ảnh mạng network nghệ thuật ngôn ngữ nhà Trần pin laptop quảng cáo tiếng anh trạng thái Trần Thủ Độ tên miền tắt hoạt động từ vựng video viettel window 10 word zalo Đơn giản

Recent News

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023

Trang tin nóng hổi - vừa thổi vừa xem

No Result
View All Result
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z

Trang tin nóng hổi - vừa thổi vừa xem