The U.S. Cybersecurity and Infrastructure Security Agency has added two more flaws to its catalog of Known Exploited Vulnerabilities, based on evidence of active exploitation.
CVE-2022-34713 and informally referred to as DogWalk, the security flaw in MSDT allows an attacker to place a malicious executable into the Windows Startup folder.
The problem came back to public attention this year by security researcher j00sean, who summarized what an attacker could achieve by exploiting it and provided video.
An attacker could leverage it to plant a malicious file on the target system by extracting it to an arbitrary location during the unpack operation.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-based attack scenario, an attacker could host a website containing a specially crafted file designed to exploit the vulnerability.
For the vulnerabilities, federal agencies in the U.S. are expected to apply the updates from the vendors by August 30.