CVE-2022-30190
vulnerability analysis and mitigation

Overview

CVE-2022-30190, also known as the Microsoft Support Diagnostic Tool (MSDT) vulnerability, was disclosed on May 30, 2022. This remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Microsoft Word. The vulnerability affects Windows Server 2019, Windows 10 version 1809, and later supported versions of Windows (MSRC Blog, CVE).

Technical details

The vulnerability allows an attacker to execute arbitrary code through the MSDT URL protocol when called from applications like Microsoft Word. When successfully exploited, the attacker gains the ability to run code with the privileges of the calling application. The vulnerability received official patches through Windows updates released on June 14, 2022, with additional defense-in-depth variants addressed in July 2022 cumulative updates (MSRC Blog).

Impact

Successful exploitation of this vulnerability enables attackers to execute arbitrary code with the privileges of the calling application. This access allows attackers to install programs, view, modify, or delete data, and create new accounts within the context of the user's rights. The impact is particularly significant when the vulnerability is exploited through commonly used applications like Microsoft Word (CVE, MSRC Blog).

Mitigation and workarounds

Microsoft provided several mitigation options, including disabling the MSDT URL Protocol through registry modification. Users can disable this by running Command Prompt as Administrator and executing 'reg delete HKEYCLASSESROOT\ms-msdt /f'. Additionally, Microsoft Office's Protected View and Application Guard features provide protection against this vulnerability when opening documents from the internet (MSRC Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management