FAQ: Mitigating Microsoft Office’s ‘Follina’ zero-day

Credit to Author: Threat Intelligence Team| Date: Wed, 01 Jun 2022 16:36:44 +0000

On Monday May 30, 2022, Microsoft issued CVE-2022-30190 for a zero-day remote code vulnerability, ‘Follina’, already being exploited in the wild via malicious Word documents.

Q: What exactly is Follina?

A: Follina is the nickname given to a new vulnerability discovered as a zero-day and identified as CVE-2022-30190. In technical terms it is a Remote Code Execution Vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).

Q: But what does it mean, and is this a serious vulnerability?

A: An attacker can send you a malicious Office document that will compromise your machine with malware when you open it. It is serious since it is already actively being exploited in the wild and doesn’t require users to enable macros.

Q: Does Malwarebytes protect against Follina?

A: Yes, it does. Please see additional steps below based on your product to ensure you are protected.

How to add protection with Malwarebytes

Malwarebytes Premium (Consumer)

Follow the instructions below to add sdiagnhost.exe as a new protected application.

Malwarebytes Nebula (Enterprise)

Follow the instructions below to add sdiagnhost.exe as a new protected application.

The post FAQ: Mitigating Microsoft Office’s ‘Follina’ zero-day appeared first on Malwarebytes Labs.

https://blog.malwarebytes.com/feed/